According to the firm’s latest supply chain security report, there was a 73% increase in detections of malicious open-source packages in 2025. The past year also saw a huge jump in the scope of ...
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing arbitrary code on the underlying host system.
Vulnerabilities in the NPM, PNPM, VLT, and Bun package managers could lead to protection bypasses and arbitrary code ...
North Korea is doubling down on a familiar playbook by weaponizing trust in open-source software and developer workflows. The ...
A $10.9 billion bank acquisition is wrapping up ahead of schedule, and the bank's CEO has laid out an aggressive expansion ...
A House committee has advanced resolutions to hold former President Bill Clinton and former Secretary of State Hillary Clinton in contempt of Congress over the Jeffrey Epstein investigation. The Repub ...
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no ...
A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact ...
North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
Fifth Third Bancorp has set a date for the upcoming $10.9 billion acquisition of Dallas-based bank Comerica Inc.
GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...