ReversingLabs researcher Lucija Valentić discovered malicious packages on the Node Package Manager (npm) open source repository that abused Ethereum smart contracts to facilitate malicious command and control.
Recent Posts
How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe
Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year’s Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT threats.
Update: Tungsten Automation Data Breach: What You Need to Know
Tungsten Automation, a provider of workplace automation software was the victim of a cyber attack that resulted in the theft of data on more than 5,000 current and former employees, the company disclosed on Friday.
Report: Epidemic of Flaws in Commercial and Open Source Code
ReversingLabs’ 2025 Software Supply Chain Security Report finds that security flaws in commercial and open source code are epidemic as hackers target supply chains including those for cryptocurrency and AI in a play for access to sensitive data and IT assets.
Episode 260: The Art of Teaching Secure Coding with Tanya Janca
In this episode of the podcast, host Paul Roberts welcomes Tanya Janca of She Hacks Purple back into the studio. Tanya talks about her newly released book: Alice and Bob Learn Secure Coding, published by Wiley and the larger problem of how to promote the teaching of secure coding practices to developers.

