Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosyste… Continue reading Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Posted in Uncategorized

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…”
— Epictetus, 50–135 AD

Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a… Continue reading Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

Posted in Uncategorized

Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)

Google is in the process of rolling out Chrome v134.0.6998.178 to Windows users to fix CVE-2025-2783, a zero-day vulnerability that allowed attackers to to bypass Chrome sandbox protections. The vulnerability was flagged by Kaspersky researchers, who d… Continue reading Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)

American Oversight v. Hegseth, Gabbard, Ratcliffe, Bessent, Rubio, and NARA Regarding Military Actions Planned on Signal Messaging App

Docket Number 25-0883 in District Court for the District of Columbia. Lawsuit filed against Defense Secretary Pete Hegseth, DNI Tulsi Gabbard, CIA Director John Ratcliffe, Treasury Secretary Scott Bessent, Secretary of State and acting Archivist Marco … Continue reading American Oversight v. Hegseth, Gabbard, Ratcliffe, Bessent, Rubio, and NARA Regarding Military Actions Planned on Signal Messaging App

How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More

When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your… Continue reading How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More

Posted in Uncategorized