Malicious npm Package with 206K Downloads Targeting GitHub Repositories to Steal Tokens

On Friday, November 7th, Veracode Threat Research discovered a dangerous typosquatting campaign targeting developers using GitHub Actions. The malicious npm package “@acitons/artifact” had accumulated over 206,000 downloads before being removed, posing a significant threat to GitHub-owned repositories and potentially compromising…

Hackers Demand 200K From Doctor Alliance

A cybersecurity research firm has detected a significant trove of data circulating on the dark web, reportedly containing $1.24$ million files The post Hackers Demand 200K From Doctor Alliance first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Police Take Down Major Malware Operations

Law enforcement authorities from nine countries recently executed the latest phase of Operation Endgame, a significant international action designed The post Police Take Down Major Malware Operations first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…

Hyundai Breach Risks Drivers Data

Hyundai AutoEver, the IT subsidiary of the larger Hyundai Group, recently began notifying customers about a major security breach it experienced. The post Hyundai Breach Risks Drivers Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…

OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data

Security researchers have successfully extracted the system prompt from OpenAI’s Sora 2 video generation model by exploiting cross-modal vulnerabilities, with audio transcription proving to be the most effective extraction method. Sora 2, OpenAI’s state-of-the-art multimodal model for generating short video…

Threat Actors Use JSON Storage for Hosting and Delivering Malware via Trojanized Code

A sophisticated campaign attributed to North Korean-aligned threat actors is weaponizing legitimate JSON storage services as an effective vector for deploying advanced malware to software developers worldwide. The “Contagious Interview” operation demonstrates how threat actors continue to innovate in their…

The State of Ransomware in Q3 2025

The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law enforcement takedowns earlier in the year, ransomware attacks remain at historically high levels. Check Point Research tracked 1,592 new victims across 85 active extortion groups,…

Images

In writing Investigating Windows Systems, published in 2018, I made use of publicly available images found on the Internet. Some were images posted as examples of techniques, others were posted by professors running courses, and some were from CTFs. If…