
Hackers Abuse Parental Controls to Hijack Google Accounts
Learn how attackers are re-casting adults as minors to bypass recovery and lock users out.

Learn how attackers are re-casting adults as minors to bypass recovery and lock users out.

RL documented 163 samples of the Linux exploit's new variants, active malware — and developed YARA rules.

Here’s what you need to know about the Linux kernel privilege escalation — and how to use YARA rules to get on top of it.

PromptMink has evolved into a malicious dependency in a package that allows access to crypto wallets and funds.

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

Here’s a more-in-depth technical analysis of the packages involved in the "graphalgo" campaign.

A new branch of a fake job recruitment campaign, dubbed "graphalgo," is targeting developers with a RAT.

By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up.

This RL Researcher’s Notebook highlights the packer’s evolution — and offers a YARA rule to detect all versions.

Highlighting an alarming trend, RL has discovered malicious packages targeting crypto wallets and OAuth tokens to steal funds.

RL researchers have identified 19 malicious extensions on the VS Code Marketplace — the majority containing a malicious file posing as a PNG.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial