Security

Malicious Packages, Hijacked Code, and Phishing: Why Open Source Developers Are Facing a Growing Supply-Chain Nightmare

Malicious Packages, Hijacked Code, and Phishing: Why Open Source Developers Are Facing a Growing Supply-Chain Nightmare

Image by Kaley Dykstra on Unsplash It’s been a rough week for open source software users—and an even tougher one for developers. Supply-chain attacks are making waves again, this time hitting trusted packages on npm and PyPI that thousands of people rely on. Here’s what went down, and why it should make anyone building with […]

Malicious Packages, Hijacked Code, and Phishing: Why Open Source Developers Are Facing a Growing Supply-Chain Nightmare Read More »

Hackers Claim They Took Down Russia’s Largest Airline — And Might Leak Passengers’ Personal Data

Hackers Claim They Took Down Russia’s Largest Airline — And Might Leak Passengers’ Personal Data

Photo by Sergey Svechnikov on Unsplash When Russia’s biggest airline, Aeroflot, suddenly canceled flights and threw airports across the country into chaos on Monday, most people assumed it was another technical glitch. But according to two pro-Ukrainian hacker groups, this was no accident. What Actually Happened? Let’s start with the basics: Aeroflot canceled around 40

Hackers Claim They Took Down Russia’s Largest Airline — And Might Leak Passengers’ Personal Data Read More »

From BlackSuit to Chaos: New Ransomware Group Emerges After Law Enforcement Crackdown

From BlackSuit to Chaos: New Ransomware Group Emerges After Law Enforcement Crackdown

Photo by Christina @ wocintechchat.com on Unsplash A global task force took down the BlackSuit ransomware group. But just weeks later, a new threat called Chaos has already stepped in—and it’s looking a lot like déjà vu for cybersecurity experts. Here’s what’s happening. A Takedown, Then a Comeback Not long after Operation CheckMate—a joint international

From BlackSuit to Chaos: New Ransomware Group Emerges After Law Enforcement Crackdown Read More »

A Sneaky Flaw in Google’s Gemini CLI Let Hackers Run Hidden Commands — Experts Found It In Just 48 Hours

A Sneaky Flaw in Google’s Gemini CLI Let Hackers Run Hidden Commands — Experts Found It In Just 48 Hours

Photo by Mika Baumeister on Unsplash It started as a flashy new AI tool meant to help developers write code from their terminal. But within two days of its launch, researchers uncovered a serious security flaw that could’ve given hackers full access to your machine — all with just a few cleverly planted sentences. Let’s

A Sneaky Flaw in Google’s Gemini CLI Let Hackers Run Hidden Commands — Experts Found It In Just 48 Hours Read More »

Russian Hackers Used Moscow ISPs to Target Foreign Embassies with Fake Portals and Custom Malware

Russian Hackers Used Moscow ISPs to Target Foreign Embassies with Fake Portals and Custom Malware

Photo by Nikolay Vorobyev on Unsplash When you’re inside a foreign embassy, you’d probably assume your internet connection is secure. But what if your local ISP is part of the threat? That’s exactly what Microsoft’s security team uncovered. Since last year, a state-backed Russian hacking group—known as Secret Blizzard—has been secretly targeting foreign embassies in

Russian Hackers Used Moscow ISPs to Target Foreign Embassies with Fake Portals and Custom Malware Read More »

Hackers Smuggled 4G-Enabled Raspberry Pi into Bank Network to Breach ATM System, Researchers Reveal

Hackers Smuggled 4G-Enabled Raspberry Pi into Bank Network to Breach ATM System, Researchers Reveal

Image by Christina @ wocintechchat.com on Unsplash In a breach that blends physical intrusion with cutting-edge malware, hackers planted a Raspberry Pi connected to a 4G modem inside the network of an unnamed bank—putting them one step away from compromising the bank’s ATM system. Cybersecurity firm Group-IB revealed the new tactic in a report released

Hackers Smuggled 4G-Enabled Raspberry Pi into Bank Network to Breach ATM System, Researchers Reveal Read More »