Main Pages
Use cases
Resources
Main Pages
Use cases
Resources
Recent posts
Latest from us

Trojan Horse Extensions: How "Zoom Stealer" Spied on Millions of Corporate Meetings
A new espionage campaign known as "Zoom Stealer" has compromised over 2 million browsers by using popular, functional extensions to secretly scrape sensitive data from professional meetings on Zoom, Teams, and Google Meet.
Read article

Trojan Horse Extensions: How "Zoom Stealer" Spied on Millions of Corporate Meetings
A new espionage campaign known as "Zoom Stealer" has compromised over 2 million browsers by using popular, functional extensions to secretly scrape sensitive data from professional meetings on Zoom, Teams, and Google Meet.
Read article

The Second Coming: How "Shai-Hulud 2.0" Unleashed a New Worm on the Developer Ecosystem
The "Shai-Hulud 2.0" supply chain attack has compromised over 25,000 GitHub repositories by using a worm-like malware that evades detection via the Bun runtime and hides stolen data within public GitHub repositories.
Read article

The Second Coming: How "Shai-Hulud 2.0" Unleashed a New Worm on the Developer Ecosystem
The "Shai-Hulud 2.0" supply chain attack has compromised over 25,000 GitHub repositories by using a worm-like malware that evades detection via the Bun runtime and hides stolen data within public GitHub repositories.
Read article
