
How Dirty Frag rose from Copy Fail exploit
RL documented 163 samples of the Linux exploit's new variants, active malware — and developed YARA rules.

RL documented 163 samples of the Linux exploit's new variants, active malware — and developed YARA rules.

Here’s what you need to know about the Linux kernel privilege escalation — and how to use YARA rules to get on top of it.

PromptMink has evolved into a malicious dependency in a package that allows access to crypto wallets and funds.

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

Here’s a more-in-depth technical analysis of the packages involved in the "graphalgo" campaign.

A new branch of a fake job recruitment campaign, dubbed "graphalgo," is targeting developers with a RAT.

By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up.

This RL Researcher’s Notebook highlights the packer’s evolution — and offers a YARA rule to detect all versions.

Highlighting an alarming trend, RL has discovered malicious packages targeting crypto wallets and OAuth tokens to steal funds.

RL researchers have identified 19 malicious extensions on the VS Code Marketplace — the majority containing a malicious file posing as a PNG.

Shai-hulud 2.0 malware has spread to 795 npm packages — and been downloaded more than 100M times.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial