Several security vulnerabilities, some classified as high-risk, have been discovered in the popular JavaScript runtime ...
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing arbitrary code on the underlying host system.
A flaw in the binary-parser npm package before version 2.3.0 lets attackers execute arbitrary JavaScript via unsanitized parser input.
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
Developers now need to be careful with job offers. Criminals are trying to distribute infostealers through them.
According to the firm’s latest supply chain security report, there was a 73% increase in detections of malicious open-source packages in 2025. The past year also saw a huge jump in the scope of ...
Microsoft’s new winapp CLI simplifies Windows app development with one-command setup, faster testing, and easier packaging.
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no ...
Android malware uses AI to trick traditional defenses ...
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy ...
Researchers at cybersecurity company Group-IB found that DeadLock, a ransomware family discovered in July 2025, is now using smart contracts, or self-executing programs, on the popular Polygon (POL) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results