Skip to content

xpool.eu

crypto news aggregator

DuckDB Malware Security

DuckDB NPM Account Compromised, Leading to Malicious Software Release

Posted on: September 9, 2025

SlowMist Technology’s Chief Information Security Officer, 23pds, revealed that the DuckDB NPM account was compromised earlier today. As a result, malicious versions of DuckDB and duckdb-wasm were released. […]

Malware NPM Phishing

Malicious Code Injection Threatens Popular npm Packages

Posted on: September 9, 2025

A phishing attack has impacted renowned developer qix, leading to malicious code being injected into popular npm packages: chalk, strip-ansi, and color-convert. This attack exploited wallet functions, altered […]

Cryptocurrency Ethereum Malware

Hackers Hide Malware Using Ethereum Smart Contracts in NPM Packages

Posted on: September 5, 2025

New research reveals hackers are leveraging blockchain technology to deliver malware disguised as legitimate code. This tactic has been found by cybersecurity firm ReversingLabs, who discovered two malicious […]

Blockchain Cryptosecurity Ethereum Malware

Hackers Use Ethereum Contracts to Hide Malware in Open-Source Libraries

Posted on: September 5, 2025

Cybercriminals are increasingly turning to Ethereum smart contracts to disguise malicious code within open-source libraries, making detection and removal more challenging. Research by ReversingLabs reveals that hackers are […]

Ethereum JavaScript Malware

Ethereum Smart Contracts Targeted in JavaScript Malware Campaign

Posted on: September 4, 2025

A new malware campaign has reportedly exploited Ethereum smart contracts to distribute JavaScript malware, according to ReversingLabs security firm. The campaign utilizes npm packages like `colortoolsv2` and a […]

Crypto Security Ethereum Malware

How Hackers are Hiding Malware Inside Ethereum Smart Contracts

Posted on: September 4, 2025

Cybercriminals are increasingly leveraging the power and secrecy of Ethereum smart contracts to hide malicious code. This new approach makes malware detection significantly harder, posing a significant challenge […]

Blockchain Security Ethereum Malware

Ethereum Smart Contracts Become Weapon in New Malware Tactics

Posted on: September 4, 2025

Cybersecurity experts are raising alarms after hackers are increasingly using Ethereum smart contracts to disguise malicious code within their attacks. These so-called “supply chain attacks” exploit the anonymity […]

Crypto Security Ethereum Malware

Hidden Malware Threat Identified in Ethereum Smart Contracts

Posted on: September 4, 2025

A recent report from research firm ReversingLabs has uncovered a concerning security vulnerability within Ethereum smart contracts. Hackers have discovered a method for concealing malicious code, potentially posing […]

Cryptosecurity Ethereum Malware

New Malware Hiding Technique Targets Ethereum Smart Contracts

Posted on: September 4, 2025

Hackers have developed a novel method to conceal malware within Ethereum smart contracts, posing a new challenge for security systems. ReversingLabs researchers discovered two malicious JavaScript packages, ‘colortoolsv2’ […]

Blockchain Ethereum Malware

Ethereum Smart Contracts Enable New Malware Hiding Methods

Posted on: September 4, 2025

Cyberattacks are getting increasingly sophisticated, with hackers now using Ethereum smart contracts to hide malware commands and evade detection systems. The discovery highlights a new challenge for security […]

Ethereum Malware Software Supply Chain

Ethereum Smart Contracts Used in Malware Concealment: Hackers Target Developers

Posted on: September 4, 2025

New findings from ReversingLabs reveal a sophisticated attack that exploited Ethereum’s smart contracts to inject malware into open-source software repositories like npm and GitHub. This tactic allows hackers […]

Ethereum Malware Security

New Malware Leverages Ethereum Smart Contracts for Stealthy Deployment

Posted on: September 4, 2025

A sophisticated new malware technique has emerged, utilizing the anonymity and security features of Ethereum smart contracts to evade detection by traditional security systems. Threat actors have developed […]

Cybersecurity Ethereum Malware

Hackers Hide Malware in Ethereum Contracts: New Attack Vector

Posted on: September 4, 2025

Threat actors have found a clever way to deliver malicious software and commands hidden within Ethereum smart contracts. This technique evades security scans as attacks on code repositories […]

Cryptocurrency Discord Malware

Discord Invite Links Targeted for Crypto Malware Campaign

Posted on: June 14, 2025

A new malware campaign targeting cryptocurrency users via compromised Discord invite links has been uncovered. This method exploits a vulnerability in the platform’s invitation system, allowing malicious actors […]

Cryptosecurity Cybercrime Malware

Crypto Malware Threat: The Rise of Silent Thieves

Posted on: June 11, 2025

A new wave of crypto malware is sweeping across the digital asset world, striking with advanced tactics designed to exploit users’ trust while they sleep. Two notorious groups […]

Posts pagination

Previous page Page 1 Page 2 Page 3 … Page 5 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2026 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}