FortiGuard Labs Uncovers Series of Malicious NPM Packages Stealing Data

By Waqas
There are over 17 million developers worldwide who use NPM packages, making it a lucrative target for cybercriminals.
This is a post from HackRead.com Read the original post: FortiGuard Labs Uncovers Series of Malicious NPM Packages Stealing D… Continue reading FortiGuard Labs Uncovers Series of Malicious NPM Packages Stealing Data

Luna Grabber Malware Hits Roblox Devs Through npm Packages

By Habiba Rashid
The campaign, which began at the start of August 2023, revolves around malicious packages impersonating the legitimate noblox.js,…
This is a post from HackRead.com Read the original post: Luna Grabber Malware Hits Roblox Devs Thr… Continue reading Luna Grabber Malware Hits Roblox Devs Through npm Packages

Where to query for CVEs present in a version of a software project like npm packages of python modules?

In node, I can run npm audit and it will show me known vulnerabilities for the versions my dependencies are using.
That’s cool and all, but I’d like to be able to do the following, on some website or program or anything else:
Enter an npm … Continue reading Where to query for CVEs present in a version of a software project like npm packages of python modules?

Global CDN Service ‘jsdelivr’ Exposed Users to Phishing Attacks

By Habiba Rashid
In the interconnected world of web development, open-source components play a vital role, facilitating collaboration and code sharing…
This is a post from HackRead.com Read the original post: Global CDN Service ‘jsdelivr&#8… Continue reading Global CDN Service ‘jsdelivr’ Exposed Users to Phishing Attacks

How is the npm package manager made robust security-wise, what are the keys they are using, and how do they use them?

I am specifically looking at the npm package metadata like from the lodash package, the relevant part which is this:
{
"shasum": "392617f69a947e40cec7848d85fcc3dd29d74bc5",
"tarball": "https://registr… Continue reading How is the npm package manager made robust security-wise, what are the keys they are using, and how do they use them?

Is there a database that classifies NPM library vulnerabilities as exploitable vs. benign in the browser?

I maintain several Angular apps, which contain thousands of dependencies on NPM packages. GitHub’s Dependabot notifies me of new known vulnerabilities every week (from the CVE database).
For example, Dependabot tells me that moment.js has … Continue reading Is there a database that classifies NPM library vulnerabilities as exploitable vs. benign in the browser?

Typosquatting: Legit Abquery Package Duped with Malicious Aabquerys

By Deeba Ahmed
Aabquerys use the typosquatting technique to encourage downloading malicious components, as it has been cleverly named to make it sound like the legitimate NPM module Abquery.
This is a post from HackRead.com Read the original post: Typ… Continue reading Typosquatting: Legit Abquery Package Duped with Malicious Aabquerys