News

A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could ...
The attack chain essentially involves breaking into misconfigured Docker APIs to execute a new container based on the Alpine ...
The new variant of Docker-targeting malware skips cryptomining in favor of persistence, backdoors, and even blocking rivals ...
Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet.
A new exposed Docker API attack uses Tor to hide hackers, install malware, and block admin access, sparking major security ...
The good news is that since I dropped Opera as my default Linux browser, COSMIC has had fewer problems. I no longer hear my Thelio system fan constantly whirring to keep up with Opera's demands (which ...
Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account ...
Hackers used the secrets stolen in the recent Nx supply chain attack to publish over 6,700 private repositories publicly.
A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants ...
AttackIQ has updated the assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures ...
Nx supply chain attack on Aug 26, 2025 leaked 2,349 secrets via npm packages, risking GitHub and cloud accounts.
This script is an SSH Log Viewer, a powerful tool for system administrators to monitor and analyze SSH login attempts on Linux systems using systemd's journalctl. The SSH Log Viewer is a bash script ...