Resources

Blogs and Articles

Explore Blogs and Research Articles from the team on the latest trends and methods in Cybersecurity.

Featured

Inside a Tor Backed Supply Chain Worm

CloudSEK TRIAD uncovered a sophisticated npm supply chain attack using a typosquatted package, crypto-javascri, to mimic crypto-js. The malware steals npm and GitHub credentials, hijacks maintainer accounts, republishes trojanized packages, and uses Tor-based command-and-control. The campaign targets Linux developer systems and CI/CD environments, creating serious downstream supply chain risk.

May 14, 2026

Subscribe to CloudSEK Resources

Subscribe to the latest industry news, threats and resources.

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.