QR code cybersecurity risk - malware hidden in steganographic QR codes inside npm package

NPM Package Malware Uses Steganographic QR Codes to Steal Data

Cybersecurity researchers have uncovered a new form of supply chain attack hidden within the npm ecosystem. A malicious npm package was discovered embedding malware inside steganographic QR codes, a technique designed to slip past traditional security defenses. The attack highlights growing risks in opensource software dependencies and developer tools How the Malware Works The compromised…

Read More

Drone Sightings Halt Flights in Copenhagen and Oslo, Aviation Security on Alert

Airports in Copenhagen and Oslo faced unexpected disruptions this weekend after drones were spotted near their airspace. With both airports temporarily halting flights, the incidents highlight growing concerns over drone misuse and the potential risks to aviation, national security, and public safety Drone Disruption in Copenhagen Copenhagen Airport, one of Scandinavia’s busiest hubs, suspended air…

Read More
Fake Homebrew download page used in Google Ads campaign delivering infostealer malware

Google Ads Abused to Install Hidden macOS Malware

A new malvertising campaign is using deceptive Google Ads mimicking trusted macOS software brands like Homebrew and LogMeIn to deliver potent infostealers such as AMOS and Odyssey. Mac developers and advanced users are being targeted with copy-and-paste terminal commands that install malware under the guise of legitimate apps. This expert breakdown shows how the attack works, what to watch for and how to defend your environment.

Read More
Login screen for a video management system showing strong password rules and MFA prompt, with blurred camera tiles in the background

Louvre Password Heist: Weak Credentials, Wide Open Risk

A trivial surveillance password created an opening at one of the world’s most prominent institutions. Intruders gained awareness and timed their move because credential policy failed. This analysis delivers the signals, mitigations, and governance disciplines that stop repeats: rotation, MFA, segmentation, PAM for service accounts, and continuous validation for VMS and NVR stacks—without resorting to list spam or generic advice.

Read More