Hyunwoo Kim, also known as "V4bel," recently disclosed "Dirty Frag," a dangerous security vulnerability that provides local ...
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company ...
Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
Criminal hackers have used artificial intelligence to develop a working zero-day exploit, the first confirmed case of its ...
Google has identified the first zero-day exploit likely developed by artificial intelligence, marking a new era in cyber warfare. The exploit targeted two-factor authentication (2FA) and featured code ...
What happened?: Attackers took over a maintainer account for Axios and published malicious versions to npm, potentially impacting millions of downloads. Why it matters: CSA Singapore warns supply ...
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
Critical cPanel flaw under attack, Copy Fail Linux privilege escalation, TeamPCP supply chain campaign, GitHub RCE & major ...
Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...