1 link tagged with all of: security + typosquatting + malware
Click any tag below to further narrow down your results
Links
This article details how ten malicious npm packages use typosquatting techniques to execute credential harvesting malware on developers' systems. It describes the multi-stage process, including automatic execution, IP tracking, and extensive data extraction methods targeting various operating systems.