❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Ethereum Smart Contracts Abused In Open Source Supply Chain Attack

5 September 2025 at 08:01

ReversingLabs researcher Lucija Valentić discovered malicious packages on the Node Package Manager (npm) open source repository that abused Ethereum smart contracts to facilitate malicious command and control.

The post Ethereum Smart Contracts Abused In Open Source Supply Chain Attack appeared first on The Security Ledger with Paul F. Roberts.

How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe

3 September 2025 at 06:05

Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networksβ€”and what organizations can do to defend against these (and other) IoT threats.

The post How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe appeared first on The Security Ledger with Paul F. Roberts.

πŸ’Ύ

❌
❌