Technology ❯ Information Security
Cyber Threats Incident Response Attack Vectors Malware Analysis Hacking Techniques Microsoft Malware Active Exploitation Indicators of Compromise Social Engineering Mandiant Exploitation Techniques Cyber Attacks Mercenary Spyware Security Tools Malware Development Security Research Hacking Groups Malware Campaigns Attack Campaigns Email Security Real-time Monitoring Zero-Day Exploits Vulnerability Management Hacker Groups Ransomware Telecom Security Vulnerability Tracking Zero-Day Vulnerabilities Incident Analysis
The new variant executes during npm's preinstall stage to harvest developer and CI/CD credentials.