Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosyste… Continue reading Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

Posted in Uncategorized

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…”
— Epictetus, 50–135 AD

Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a… Continue reading Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

Posted in Uncategorized

Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)

Google is in the process of rolling out Chrome v134.0.6998.178 to Windows users to fix CVE-2025-2783, a zero-day vulnerability that allowed attackers to to bypass Chrome sandbox protections. The vulnerability was flagged by Kaspersky researchers, who d… Continue reading Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)