Recent articles
-
Cybersecurity Threats in Cryptocurrency: PoisonSeed Attack Overview
Are your cryptocurrency investments safe from evolving threats? The PoisonSeed attack campaign has highlighted significant vulnerabilities through its exploitation of…
-
Unmasking EncryptHub: The Cybercriminal Behind 618 Breaches
The world of cybersecurity is fraught with complexities, particularly when it comes to understanding the motivations and backgrounds of cybercriminals.…
-
North Korean Hackers Leverage Malicious npm Packages for BeaverTail Malware Deployment
The infiltration of software supply chains by cybercriminals has become a critical issue, as seen in the recent surge of…
-
Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
Have you ever considered the safety of the packages your applications depend on? With the rising occurrences of malicious libraries…
-
SpotBugs Access Token Theft is a Wake-Up Call for Software Security
In an age where open-source software dominates the tech landscape, the security of supply chains is of paramount importance. The…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher