A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
Every time a developer types npm install, they are placing a bet that the package they are pulling into their project is not ...
In the first five months of 2026, security researchers have flagged more malicious packages on the npm registry than in all ...
A new report from ReversingLabs identified a new tactic by North Korean hackers: feeding malicious code to the AI systems ...
The threat actor seeding the Open VSX code marketplace with fraudulent extensions that download the GlassWorm malware has ...
A shadow industry of law firms and advisers is charging thousands of pounds to help migrants pretend to be gay in order to ...
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
Open source software with more than 1 million monthly downloads was compromised after a threat actor exploited a ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
CLI-Anything generates SKILL.md files that AI agents trust and execute. Snyk found 13.4% of agent skills contain critical ...
The contagion from the Kelp exploit could have been contained, but at the cost of capital efficiency, according to the founder of Curve Finance. The exploit of the Kelp liquid restaking protocol shows ...