The popular JavaScript HTTP client Axios has been compromised in a supply chain attack, exposing projects to malware through malicious npm releases. Security researchers from StepSecurity identified ...
A widely used JavaScript package used with hundreds of millions of downloads has been compromised in a new supply chain ...
Active exploits, nation-state campaigns, fresh arrests, and critical CVEs — this week's cybersecurity recap has it all.
An extremely popular NPM package used in many JavaScript projects has been compromised and can wreak havoc on your machine if ...
DarkSword exploit targets iOS 18.4–18.7 using 6 flaws and 3 zero-days, enabling rapid data theft from iPhones across multiple ...
Google Threat Intelligence Group (GTIG), Lookout Threat Labs, and iVerify published coordinated research in March 2026 on ...
A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods. The C++-based threat, also ...
The share of wealth owned by the 1% of richest people in the United States has reached a new record of 31.7% in the third quarter of 2025, the highest since records began in 1989, according to figures ...
A new report out today from Barracuda Networks Inc. has detailed how phishing attacks grew more sophisticated and harder to detect in 2025 thanks to the rapid evolution of phishing-as-a-service kits ...
A group of 19 Jeffrey Epstein accusers Monday claimed the Justice Department badly botched its release of troves of the disgraced pedo financier’s files while committing a slew of “unambiguous” law ...
A torrent of proof-of-concept (PoC) exploits for React2Shell has hit the internet following the vulnerability's disclosure last week, and while security researchers say most are fake, ineffective and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results