A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
Every time a developer types npm install, they are placing a bet that the package they are pulling into their project is not ...
In the first five months of 2026, security researchers have flagged more malicious packages on the npm registry than in all ...
A new report from ReversingLabs identified a new tactic by North Korean hackers: feeding malicious code to the AI systems ...
The threat actor seeding the Open VSX code marketplace with fraudulent extensions that download the GlassWorm malware has ...
A shadow industry of law firms and advisers is charging thousands of pounds to help migrants pretend to be gay in order to ...
Open source software with more than 1 million monthly downloads was compromised after a threat actor exploited a ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
Critical cPanel flaw under attack, Copy Fail Linux privilege escalation, TeamPCP supply chain campaign, GitHub RCE & major ...
The contagion from the Kelp exploit could have been contained, but at the cost of capital efficiency, according to the founder of Curve Finance. The exploit of the Kelp liquid restaking protocol shows ...
LayerZero said that Kelp’s DVN setup caused the $290 million exploit, as investors questioned which protocol would step up to cover the shortfall. Interoperability protocol LayerZero claims that an ...