#npmsecurity

2025-12-23

A malicious npm package is stealing WhatsApp messages — a sharp reminder that the software supply chain can betray even trusted platforms. Verify dependencies, always. 📦🔓 #SupplyChainRisk #NPMSecurity

theregister.com/2025/12/22/wha

N-gated Hacker Newsngate
2025-12-22

Wow, who knew that downloading a seemingly innocent NPM package could lead to your WhatsApp messages being harvested like crops in FarmVille? 🌾📱 Clearly, 56,000 people learned the hard way that trusting random code on the internet is like expecting your cat to respect your personal space. 🐱💻
koi.ai/blog/npm-package-with-5

2025-12-03

A malicious npm package factory is churning out contagious code — proving the software supply chain can be poisoned at the source. Developers must verify every dependency. 🧩⚠️ #NPMSecurity #SupplyChainRisk

darkreading.com/application-se

Soatok Dreamseekersoatok@furry.engineer
2025-11-19

Moving Beyond the NPM elliptic Package

If you're in a hurry, head on over to soatok/elliptic-to-noble and follow the instructions in the README in order to remove the elliptic package from your project and all dependencies in node_modules. Art: CMYKat Why replace the elliptic package? Yesterday, the Trail of Bits blog published a post about finding cryptographic bugs in the elliptic library (a Javascript package on NPM) by using the Wycheproof.

soatok.blog/2025/11/19/moving-

#npm #crypto #cryptography #elliptic #security #infosec #cve #mitigation #appsec #javascript #js #npm #npmsecurity #npmpackages

2025-11-13

Over 46,000 fake npm packages flood the ecosystem — attackers are poisoning the software supply chain at scale. Developers must verify before they install. 📦⚠️ #SoftwareSupplyChain #NPMSecurity

thehackernews.com/2025/11/over

2025-10-30

🚨 10 npm packages found deploying a multi-stage credential harvester.

Fake CAPTCHAs, IP fingerprinting, and PyInstaller malware targeting Windows, macOS, Linux - all under typosquatted names like typescriptjs and etherdjs.

💬 How are you strengthening your open-source dependency vetting?
Follow @technadu for daily infosec intel and malware investigations.

#CyberSecurity #SupplyChainAttack #NPMSecurity #DevSecOps #ThreatIntelligence #CredentialTheftattacks

10 npm Typosquatted Packages Deploy Multi-Stage Credential Harvester
2025-10-29

A simple typo could be the door hackers use to break in. Malicious npm packages with nearly identical names are now tricking developers to steal credentials and data. Curious how a spelling error can lead to major breaches?

thedefendopsdiaries.com/the-an

#npmsecurity
#typosquatting
#supplychainattack
#malware
#infostealer

2025-09-23

Could a simple QR code hide a hidden threat? The fezbox npm incident revealed malware camouflaged inside a QR code, challenging everything we thought we knew about cybersecurity. Read on to see how attackers are outsmarting traditional defenses.

thedefendopsdiaries.com/stegan

#qrsecurity
#steganography
#npmsecurity
#malwaredetection
#cyberattacktrends

2025-09-23

A QR code turned Trojan horse? A crafty npm package used hidden QR codes to smuggle cookie-stealing malware, evading detection in plain sight. How safe is our open-source world?

thedefendopsdiaries.com/stegan

#qrsecurity
#steganography
#npmsecurity
#malwaredetection
#cyberattacktrends

Technotenshi 🏳️‍⚧️technotenshi@tech.lgbt
2025-09-16

Over 40 NPM packages, including the widely used @Ctrl/tinycolor, were compromised in a supply chain attack that harvests cloud credentials and persists via GitHub Actions backdoors. The malware self-propagates by infecting other packages maintained by compromised authors.

stepsecurity.io/blog/ctrl-tiny

#SupplyChainAttack #NpmSecurity #DevSecOps #InfosecNews

2025-09-16

Npm packages are under siege. How did attackers use trusted developer tools to weave a self-spreading threat across the open-source community? Find out how the Shai-Hulud attack could change software security forever.

thedefendopsdiaries.com/unders

#shaihuludattack
#softwaresupplychain
#npmsecurity
#cyberthreats
#opensourcevulnerabilities

Metadropmetadrop
2025-09-10

Although npm has been compromised, your site is probably not affected. Read this article to help you keep calm and avoid panicking, while still keeping an eye on web security:

metadrop.net/en/articles/npm-c

2025-08-10

WhatsApp devs, beware: rogue npm packages disguised as legit libraries can unleash a data wipe (rm -rf *) and hide a secret exfiltration function. How safe is your code when even kill switches are in play? Dive deeper.

thedefendopsdiaries.com/unmask

#npmsecurity
#whatsappdevelopers
#supplychainattack
#cybersecurity
#maliciouspackages

Security Landsecurityland
2025-07-28

🚨 Massive NPM supply chain attack compromises popular JavaScript packages including 'is' and ESLint tools. Millions of projects at risk from sophisticated phishing campaign. Immediate action required for all Node.js developers.

Read More: security.land/massive-npm-supp

Example code
2025-06-07

Some npm packages disguised as helpful utilities have been found wiping entire directories. How are these digital saboteurs sneaking into projects, and what can you do to stop them? Find out more.

thedefendopsdiaries.com/unders

#npmsecurity
#maliciouspackages
#softwaredevelopment
#cybersecurity
#supplychainsecurity

2025-06-07

A breach in 16 popular NPM packages rocked the JavaScript world—malicious code gave attackers a backdoor right into trusted projects. How secure are your dependencies?

thedefendopsdiaries.com/unders

#supplychainattack
#npmsecurity
#javascript
#cybersecurity
#malware

2025-06-02

The rise of malicious npm packages—like `xlsx-to-json-lh` mimicking `xlsx-to-json-lc`—raises urgent questions. Should npm enforce name uniqueness and vetting to stop supply chain attacks, or risk stifling its open ecosystem? #NpmSecurity #OpenSourceRisks #Cybersecurity

saysomething.hashnode.dev/npms

2025-05-23

Ever downloaded a package that turned out to be a Trojan? Malicious NPM packages are using typosquatting and stealth tactics to sneak into development environments. How secure is your code?

thedefendopsdiaries.com/naviga

#npmsecurity
#maliciouspackages
#softwaredevelopment
#cybersecurity
#dataprotection

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst