New Docker Malware Strain Spotted Blocking Rivals on Exposed APIs

Akamai finds new Docker malware blocking rivals on exposed APIs, replacing cryptominers with tools that hint at early botnet development.

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations

The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools.

The post Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations appeared first on SecurityWeek.

SecurityWeek – ​Read More

Aembit Named to Fast Company’s Seventh-Annual List of the 100 Best Workplaces for Innovators

Silver Spring, USA, 9th September 2025, CyberNewsWire

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

How Leading CISOs are Getting Budget Approval

It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized.
If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they’re framed in a way the board can understand and appreciate.

The Hacker News – ​Read More

Plex Urges Password Resets Following Data Breach

Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database.

The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

Finally, a Windows desktop I can confidently put away my iMac for

Lenovo’s Legion T5 is a powerhouse gaming desktop that delivers top-notch performance at a midrange price. But not everyone will love its physical design.

Latest news – ​Read More

Popular npm packages compromised | Kaspersky official blog

Several popular npm packages used in a number of web projects have been compromised and trojanized by unknown attackers. The attackers, through a phishing attack on maintainers, were able to gain access to at least one repository and injected the packages with malicious code used to hunt for cryptocurrency. Thus, all web applications that used trojanized versions of the packages were turned into cryptodrainers. And there can be quite a few of them — as the compromised packages had more than two billion downloads per day (according to Aikido Security).

What are the dangers of the trojanized packages used in this attack?

Obfuscated JavaScript was added to all affected packages. If the compromised package is used in a web application, the malicious code is activated on the devices that were used to access this application. Acting at the browser level, malware intercepts network traffic and API requests, and changes data associated with Ethereum, Bitcoin, Solana, Litecoin, Bitcoin Cash, and Tron cryptocurrency wallets. The malware spoofs their addresses and redirects transactions to the attackers’ wallets.

About three hours after the attack began, the npm administration started to remove the infected packages, but it’s not known exactly how many times they were downloaded during this time.

How the attackers managed to gain access to the repositories

The attackers used a rather banal technique — they created a phishing email in which maintainers were urged to update their two-factor authentication credentials at the first opportunity. Otherwise, they were threatened with account lockout starting September 10, 2025. The emails were sent from a mailbox on the domain npmjs[.]help, similar to the legitimate npmjs.com. The same domain also hosted a phishing site that mimicked the official npm registry page. Credentials entered on this site immediately fell into the hands of the attackers.

The attack was successful against at least one maintainer, compromising the npm packages color, debug, ansi-regex, chalk, and several others. However, the phishing attack appears to have been more extensive, because other maintainers and developers received similar phishing emails, so the full list of trojanized packages may be longer.

Which packages were compromised?

At the time of writing this post, the following packages are known to be compromised:

  • ansi-regex
  • ansi-styles
  • backslash
  • chalk
  • chalk-template
  • color-convert
  • color-name
  • color-string
  • debug
  • error-ex
  • has-ansi
  • is-arrayish
  • simple-swizzle
  • slice-ansi
  • strip-ansi
  • supports-color
  • supports-hyperlinks
  • wrap-ansi

However, as we have already written above, the list may grow. You can keep an eye on the GitHub advisory page for updates.

How to stay safe

Kaspersky Lab products, both for home and for corporate users, successfully detect and stop the malware used in this attack.

Developers are advised to audit the dependencies in their projects, and if one of the compromised packages was used there, pin the safe version using the overrides function in package.json. You can find more detailed instructions here.

Maintainers and developers with access to open source software repositories are advised to be doubly careful when receiving emails urging them to log into their accounts. Better yet — also use security solutions with an anti-phishing engine.

Kaspersky official blog – ​Read More

This Fedora spin is perfect for one particular kind of new Linux user

With Windows 10 support ending, you might be looking for an alternative. If you like the idea of Fedora, but are afraid it isn’t user-friendly enough, Nobara has your back.

Latest news – ​Read More

Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

Geedge Networks, a company with ties to the founder of China’s mass censorship infrastructure, is selling its censorship and surveillance systems to at least four other countries in Asia and Africa.

Security Latest – ​Read More

How to undo OneDrive Backup and restore your personal files to your Windows 11 PC

Microsoft is getting more aggressive about insisting that you use its OneDrive cloud for your Windows 11 and Microsoft 365 files. If you’d prefer to keep those files out of the cloud, follow these step-by-step instructions.

Latest news – ​Read More