Credential Theft
Details on methods and consequences of credential theft
-
Shai-Hulud Supply Chain Attack: How npm Tokens Became Million-Dollar Keys
Shai-Hulud demonstrates how compromised npm tokens became a self-replicating worm affecting hundreds of packages, exposing 400,000 developer secrets and enabling the $8.5 million Trust Wallet crypto theft.
·
·
4–7 minutes -
What is Rhadamanthys Infostealer?
Rhadamanthys Infostealer compromises digital security by illicitly acquiring sensitive user data. This sophisticated malicious software operates as a Malware-as-a-Service (MaaS), posing a significant threat to individuals and organizations. It facilitates…
·
·
2–3 minutes


