Censys has discovered more than 380,000 hosts, including major platforms, still referencing the malicious polyfill.io domain. JavaScript scripts referencing the recently suspended polyfill.io domain ...
The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to tens of millions of websites has been traced to a ...
Polyfill, a JavaScript CDN service, claimed to be defamed and relaunched on a new domain after researchers exposed it for delivering malicious code on more than 1,00,000 websites. The service claimed ...
Claims, counterclaims, website shutdowns, redirections and DDoS attacks were among the highlights (or lowlights) as news of the Polyfill supply chain attack entered its second day. After Polyfill(.)io ...
In the past 48 hours, the cybersecurity community has been reporting on a significant incident involving Polyfill[.]io, a widely used JavaScript CDN service. First reports by Sansec flagged the ...
Cloudflare, a lead provider of content delivery network (CDN) services, cloud security, and DDoS protection has warned that it has not authorized the use of its name or logo on the Polyfill.io website ...
In a significant supply chain attack, over 100,000 websites using Polyfill[.]io, a popular JavaScript CDN service, were compromised.
The polyfill.io domain is being used to infect more than 100,000 websites with malicious code after what's said to be a Chinese organization bought the domain earlier this year, researchers have said.
Do you recommend any specific steps to circumvent or fix this issue temporarily while a permanent solution is being worked on? Is there an alternative CDN or method of accessing the library that you ...
Threat actors known as CoralRaider have been using the Bynny content delivery network (CDN) to distribute infostealers to victims around the world. Rresearchers Cisco Talos have revealed who said ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results