supply-chain-attack

Preview image for: Rogue Outlook Add-in

Rogue Outlook Add-in "AgreeTo" Transforms into Potent Phishing Kit, Exfiltrating 4,000 Credentials and Payment Data

Abandoned Outlook add-in "AgreeTo" became a sophisticated phishing kit, stealing 4,000 credentials and payment data.
Preview image for: GitHub Codespaces: Unmasking RCE Vulnerabilities via Malicious Repository Injections

GitHub Codespaces: Unmasking RCE Vulnerabilities via Malicious Repository Injections

Deep dive into RCE threats in GitHub Codespaces, detailing attack vectors, exploitation, and robust mitigation strategies.
Preview image for: New GlassWorm Attack Leverages Compromised OpenVSX Extensions to Target macOS Developers and Crypto Assets

New GlassWorm Attack Leverages Compromised OpenVSX Extensions to Target macOS Developers and Crypto Assets

GlassWorm's new macOS attack exploits compromised OpenVSX extensions, stealing passwords, crypto-wallet data, and developer credentials.
Preview image for: Unmasking the ClawHub Threat: 341 Malicious Skills Jeopardize OpenClaw Users with Data Theft Campaigns

Unmasking the ClawHub Threat: 341 Malicious Skills Jeopardize OpenClaw Users with Data Theft Campaigns

Koi Security uncovers 341 malicious ClawHub skills, exposing OpenClaw users to supply chain data theft risks.
Preview image for: Unmasking the Architects: Who Operates the Badbox 2.0 Botnet?

Unmasking the Architects: Who Operates the Badbox 2.0 Botnet?

Kimwolf botnet claims compromise of Badbox 2.0 C2, potentially revealing operators of the vast Android TV box botnet.
Preview image for: ISC Stormcast Review: Navigating the Evolving Phishing Landscape of Early 2026

ISC Stormcast Review: Navigating the Evolving Phishing Landscape of Early 2026

Analyzing the ISC Stormcast from Jan 26, 2026, focusing on advanced phishing, supply chain threats, and crucial defenses.
Preview image for: Elevated Risk: Unmasking Automatic Script Execution Vulnerabilities in Visual Studio Code

Elevated Risk: Unmasking Automatic Script Execution Vulnerabilities in Visual Studio Code

Deep dive into automatic script execution risks in VS Code, exploring attack vectors, mitigations, and the critical need for vigilance.
Preview image for: ISC Stormcast Review: Navigating 2026's Evolving Cyber Threat Landscape

ISC Stormcast Review: Navigating 2026's Evolving Cyber Threat Landscape

Deep dive into ISC Stormcast's January 21, 2026 episode, covering AI-driven threats, supply chain risks, and proactive defense.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics