Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shai-Hulud npm supply chain attack - new compromised packages detected

(Nov 24, 2025) JFrog continues to track, provide research and document another wave of the Shai-Hulud Software Supply Chain Attack which was originally reported by the JFrog Security Research team on 16-Sep-2025. Following the initial campaign, threat actors have returned with more advanced tactics, compromising an additional 796 new malicious packages across leading public registries.

DORA compliance checklist: A guide for financial entities and their technology partners

While it shares a name with a popular cartoon character, there’s nothing cute about this DORA. The Digital Operational Resilience Act (DORA) has financial entitles and their service providers scrambling to meet DORA requirements or face fines and penalties. DORA is a cornerstone of the European Union's strategy to strengthen the financial sector against risks related to information and communications technology (ICT), although it has global implications that reach far beyond Europe.

10 smart ways to prevent identity theft

Nowadays, identity theft has become one of the fastest-growing cybercrimes. In 2024, the United States' Federal Trade Commission received over 1.1 million identity theft reports¹, which is an increase of about 9.5% compared to 2023. What's even more disturbing is the fact that more than 47% of the Americans have their personal info exposed². Sometimes one mistaken click or download is all it takes to turn your life upside down.

The Dark Side of Black Friday: When Ransomware Attacks Join the Shopping Rush

As retailers gear up for the year’s biggest sales, cybercriminals are preparing for their own “Black Friday rush.” They’re not after TVs, they’re after data. Last year, phishing surged more than 600%1 during Black Friday week and ransomware attacks rose nearly 60%2.

Autonomous Security is Here: A Deep Dive into OpenAI's GPT-5 Powered Threat Hunter

Every time a developer hits “commit,” the global software ecosystem takes a collective breath. Why? Because in today’s fast-paced development cycle, the sheer volume of code changes—and the 1.2% of commits estimated to introduce a bug—means that tens of thousands of new vulnerabilities emerge every single year. Security teams are in a relentless, exhausting race against time, trying to find and fix flaws before malicious actors do.

Keeper Browser Extension vs KeeperFill: What's the Difference?

Keeper Security offers leading cybersecurity solutions, including password management and Privileged Access Management (PAM), trusted by millions of users and over 100,000 organizations to protect their credentials and enhance their security. Keeper securely stores and autofills your login credentials, payment details and other sensitive information, ensuring you are the only one who can access your Keeper Vault. The main difference between the Keeper Browser Extension and KeeperFill is their function.

More Security, Speed, and Compliance: New Features from Seal Security

We are excited to announce a new wave of updates designed to streamline your development process, enhance security auditability, and dramatically improve platform performance. At Seal Security, our focus remains on giving you the easiest and most effective way to manage and remediate open source vulnerabilities. Your feedback drives our innovation, and we're thrilled to introduce capabilities that make the platform faster, cleaner, and more compliant.