Black Hat Europe 2025: Was that device designed to be on the internet at all? adminDec 19, 2025 Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found <span class="nav-subtitle screen-reader-text">Page</span> Previous PostBlack Hat Europe 2025: Reputation matters – even in the ransomware economyNext PostESET Threat Report H2 2025 Related Posts Weekly Update 505 Well, that didn’t last long! Recording this on Saturday morning... adminMay 24, 2026 npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks GitHub has rolled out new controls for npm to improve... adminMay 23, 2026 Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware A new “coordinated” supply chain attack campaign has impacted eight... adminMay 23, 2026
Weekly Update 505 Well, that didn’t last long! Recording this on Saturday morning... adminMay 24, 2026 npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks GitHub has rolled out new controls for npm to improve... adminMay 23, 2026 Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware A new “coordinated” supply chain attack campaign has impacted eight... adminMay 23, 2026
npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks GitHub has rolled out new controls for npm to improve... adminMay 23, 2026 Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware A new “coordinated” supply chain attack campaign has impacted eight... adminMay 23, 2026
Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware A new “coordinated” supply chain attack campaign has impacted eight... adminMay 23, 2026