18 May PhantomBot: A Typosquat Campaign That Pivoted From Credential Theft to a Turnkey Botnet Kit
Uncover the details of The 24712-pl Campaign and the zero-dependency packages exploited during a security incident....
Uncover the details of The 24712-pl Campaign and the zero-dependency packages exploited during a security incident....
Uncover the details of The 24712-pl Campaign and the zero-dependency packages exploited during a security incident....
An npm dependency confusion attack used eight malicious packages to fingerprint hosts and send RCE telemetry to Telegram....
Explore AI security risks in DevSecOps and understand how they affect the software development lifecycle and automation processes....
A npm typosquatting attack used six malicious EVM/DeFi packages to steal developer keys, wallets, secrets, and .env files....
FauxCode Claude Code npm malware used fake CLI packages to intercept API traffic through CA-bundle MITM and base URL hijacking....
DevTap npm typosquatting attack used six malicious packages to spy on developer workstations and abuse npm trust....
LiteLLM attack exposed critical secrets. See how Xygeni detects, verifies, and revokes credentials before attackers use them....
Master IaC cyber security with proven infrastructure as code security practices. Prevent risks for Terraform, Kubernetes or CloudFormation....
Master IaC cyber security with proven infrastructure as code security practices. Prevent risks for Terraform, Kubernetes or CloudFormation....
Master IaC cyber security with proven infrastructure as code security practices. Prevent risks for Terraform, Kubernetes or CloudFormation....
Master IaC cyber security with proven infrastructure as code security practices. Prevent risks for Terraform, Kubernetes or CloudFormation....