On December 20, 2024, a significant cybersecurity incident unfolded, targeting popular npm packages. Attackers exploited a hijacked npm token to inject malicious code into updates for @rspack/core, @rspack/cli, and the Vant package. The primary goal of this breach was to deploy the XMRig Monero
The recent identification of Bootkitty, the first UEFI bootkit specifically designed for Linux systems, has taken the cybersecurity industry by storm. For years, UEFI bootkits have primarily targeted Windows environments, but now the threat landscape has expanded to include Linux, thanks to this
Nicholas Michael Kloster, a 31-year-old man from Kansas City, is facing serious accusations for his involvement in a series of cybercrimes characterized by exceptionally poor operational security. The extensive indictment, which spans just three months in 2024, outlines a string of unlawful
Cybercriminals have developed an innovative approach to covertly deliver malware across various operating systems and platforms by creating a malware loader using the Godot Engine, an open-source game development tool. This malware loader, dubbed GodLoader, is distributed via the Stargazers Ghost
In the rapidly evolving world of cybersecurity, maintaining an effective defense against ever-changing threats is an ongoing challenge that organizations must navigate. MITRE Engenuity's ATT&CK Evaluations have emerged as a crucial tool for cybersecurity leaders to assess their strategies and
In a world increasingly reliant on technology, cybersecurity has never been more critical, and T-Mobile US recently showcased a significant victory in this ever-evolving battle. The company announced measures that thwarted aggressive cyberattacks believed to be orchestrated by China's Salt Typhoon