GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
1.
150,000 Packages Flood NPM Registry in Token Farming Campaign
(darkreading.com)
2025-11-14 |
related products
| tags:
attack
,
attack led
,
led tidal
2.
AI doesn't just assist cyberattacks anymore - now it can carry them out
(zdnet.com)
2025-11-14 | by Charlie Osborne |
related products
| tags:
anthropic
,
attack
,
claude
3.
Google says group behind E-ZPass, USPS text scam has been 'shut down' after suit
(cnbc.com)
2025-11-13 | by Jaures Yip |
related products
| tags:
germany
,
google
,
group
4.
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
(arstechnica.com)
2025-11-07 |
related products
| tags:
attack
,
files
,
image
5.
Malicious NuGet packages drop disruptive 'time bombs'
(bleepingcomputer.com)
2025-11-07 |
related products
| tags:
code
,
malicious
,
operations
6.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
2025-11-06 |
related products
| tags:
attackers
,
code
,
compromised
7.
Google spots malware in the wild that morphs mid-attack, thanks to AI
(zdnet.com)
2025-11-06 | by Charlie Osborne |
related products
| tags:
code
,
generate
,
google
8.
Gootloader malware is back with new tricks after 7-month break
(bleepingcomputer.com)
2025-11-05 |
related products
| tags:
archive
,
gootloader
,
malicious
9.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
2025-11-04 |
related products
| tags:
aware
,
browser
,
browsers
10.
Fake Solidity VSCode extension on Open VSX backdoors developers
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
command
,
ethereum
,
malicious
11.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
extensions
,
malicious
,
open
12.
Show HN: I built a tech news aggregator that works the way my brain does
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
2025
,
hrs
,
october
13.
The security paradox of local LLMs
(news.ycombinator.com)
2025-10-31 | by Jacek Migdal |
related products
| tags:
code
,
local
,
malicious
14.
CISA: High-severity Windows SMB flaw now exploited in attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
2025
,
cisa
,
malicious
15.
Malicious crypto-stealing VSCode extensions resurface on OpenVSX
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
koi
,
malicious
,
security
16.
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
(wired.com)
2025-10-31 | by Dan Goodin |
related products
| tags:
app
,
attack
,
gpu
17.
Hackers can steal 2FA codes and private messages from Android phones
(arstechnica.com)
2025-10-31 |
related products
| tags:
android
,
app
,
attack
18.
Researchers find just 250 malicious documents can leave LLMs vulnerable to backdoors
(engadget.com)
2025-10-31 |
related products
| tags:
data
,
llm
,
malicious
19.
Malicious Rust packages on Crates.io steal crypto wallet keys
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
crate
,
crates
,
malicious
20.
NPM package caught using QR Code to fetch cookie-stealing malware
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
code
,
codes
,
malicious
21.
Hidden risk in Notion 3.0 AI agents: Web search tool abuse for data exfiltration
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
client
,
data
,
malicious
22.
CISA exposes malware kits deployed in Ivanti EPMM attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
cisa
,
ivanti
,
malicious
23.
Tinycolor supply chain attack post-mortem
(news.ycombinator.com)
2025-10-31 | by Scott Cooper |
related products
| tags:
github
,
malicious
,
npm
24.
Microsoft adds malicious link warnings to Teams private chats
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
feature
,
malicious
,
message
25.
Hackers left empty-handed after massive NPM supply-chain attack
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attack
,
cloud
,
environments
26.
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
gitguardian
,
github
,
malicious
27.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
browser
,
malicious
28.
Threat actors abuse X’s Grok AI to spread malicious links
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
grok
,
instead
,
link
29.
Why you should delete your browser extensions right now - or do this to stay safe
(zdnet.com)
2025-10-31 | by Jack Wallen |
related products
| tags:
browser
,
extension
,
extensions
30.
How RubyGems.org protects OSS infrastructure
(news.ycombinator.com)
2025-10-31 | by Marty Haught |
related products
| tags:
malicious
,
org
,
rubygems
1
2
next ›
Today's top topics:
apple
deals
black
black friday
friday
game
battery
camera
phone
die message
View all today's topics →