
Groundhog day: NPM package caught stealing browser passwords
This blog discusses the process used to find another NPM package that steals saved Chrome browser passwords.

This blog discusses the process used to find another NPM package that steals saved Chrome browser passwords.

Recognizing risks introduced by statically linked third-party libraries

They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

Relying on legacy functionalities comes with inherent security risks

One of the core tenets of computer science is code reuse.


The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

Tearing Down HWP Files To Expose a Trojan

When malware lasts longer than your washing machine

YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Enriching public threat intelligence
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial