Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SHA1-Hulud, npm supply chain incident

On November 24th, 2025, we identified a new supply chain attack in the npm ecosystem, referred to as SHA1-Hulud. We believe this is a second wave of the Shai-Hulud attack, which occurred in September 2025. Snyk will continue monitoring this active incident until it is resolved. Updates on this incident will be on our trust center.

Understanding Ransomware Threats to Backup Systems

Ransomware attacks target your backups before anything else. Recent data shows that two-thirds of organizations faced ransomware in the past two years, with attackers specifically hunting backup infrastructure to eliminate recovery options. Once your backups are gone, you’re left with two choices: Pay up or lose your data permanently.

Report: Ransomware Attacks Surged Globally in October

Ransomware attacks spiked in October 2025, with more than 700 organizations sustaining attacks, according to a new report from Cyfirma. “In October 2025, ransomware activity surged globally, marking a significant resurgence after a period of mid-year stability,” the report says. “Victim counts climbed to 738, driven by renewed campaigns from leading operators and the emergence of several new groups.

SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp

Trustwave SpiderLabs researchers have recently identified a banking Trojan we dubbed Eternidade Stealer, which is distributed through WhatsApp hijacking and social engineering lures. In this blog post, we will break down the techniques used in the campaign and highlight the new tools employed by the threat group.

Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025

The cybercrime underground continues to evolve into a mature, service-based economy that mirrors legitimate technology markets. Threat actors are increasingly adopting professionalized business models, offering malware, access, and data-theft capabilities “as a service” to a broad audience of buyers. During the first half of 2025, Bitsight observed sustained growth in Malware-as-a-Service (MaaS) and Remote Access Trojan (RAT) activity across dark web forums and marketplaces.

How Cato Blocks LummaStealer in Real Time: A Look Inside SPACE Detection & Prevention

LummaStealer is one of thousands of malware variants targeting users every day. In this video, we walk through how Cato’s SASE Cloud Platform detects and stops it in real-time, before data is exfiltrated or an endpoint is compromised. You’ll see how the Cato Single Pass Cloud Engine (SPACE) inspects all traffic in one pass, applying IPS, anti-malware, DNS security, and Secure Web Gateway controls across every PoP globally for a consistent security experience.

Attackers are integrating LLMs directly into malware #cybersecurity #ai #malware #infosec #podcast

Threat actors have moved beyond using AI to speed up operations. They're now embedding large language models directly into malware. In this Intel Chat, Matt Bromiley and Chris Luft discuss Google's Threat Intelligence Group findings on malware families like PromptFlux and PromptSteal. These threats query LLMs mid-execution to dynamically alter behavior, obfuscate code, and generate system commands on demand.

Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach and impact. Their goal is to exploit the weaknesses in organizations’ fast-growing and complex environments.