Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
The wave of supply chain attacks aimed at security and developer tools has washed up more victims, namely SAP and Intercom ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
GitHub facades and Ethereum smart contracts power a March 2026 admin-targeted campaign, enabling resilient C2 rotation and ...
New AI Innovation Combines Risk-based Insights, Actionable Recommendations, Instant Justifications, and Interactive Chat to Accelerate Compliance with PCI DSS v4 Anti-Skimming Requirements PORTO, ...
Hackers working for the North Korean government have stolen more than $2 billion in crypto so far this year, according to blockchain analysis firm Elliptic. On Tuesday, Elliptic published a blog post ...
Security researchers have uncovered a Vietnamese threat group evolving from their custom PXA Stealer campaign into a multi-layered delivery chain dropping PureRAT, a feature-rich remote access trojan.