Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware hiding in plain sight: Spying on North Korean Hackers

On March 13th 2025, our malware analysis engine alerted us to a potential malicious package that was added to NPM. First indications suggested this would be a clear-cut case, however, when we started peeling back the layers things weren’t quite as they seemed. Here is a story about how sophisticated nation state actors can hide malware within packages.

Ep 4: Naming and Shaming

As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.

How to Protect Your Live Stream from Hackers and Unauthorized Access

Live streaming has become extremely popular. Whether it's for gaming, business meetings, or virtual fitness classes, it's an easy way to connect with people in real time. However, just like any other online activity, live streaming has its risks, especially when it comes to hackers or unauthorized access. Imagine you are hosting a big event, and suddenly, someone hijacks your stream. It will disrupt everything and lead to stealing sensitive information or damaging your reputation. Let's look through the simple ways to protect your live stream.

Dark Storm Team: The Hacker Group Behind the DDoS Attack on X (Twitter)

On March 10, 2025, X (formerly Twitter) experienced a series of outages due to a large-scale Distributed Denial of Service (DDoS) attack. The platform went down multiple times throughout the day, affecting millions of users globally. Elon Musk later confirmed that X was targeted by a "massive cyberattack", with initial investigations pointing to Ukraine-based IP addresses as the source.