A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
In the first five months of 2026, security researchers have flagged more malicious packages on the npm registry than in all ...
Cybersecurity firm Trellix disclosed a data breach after attackers gained access to "a portion" of its source code repository ...
Threat actors have started to exploit Copy Fail (CVE-2026-31431), a Linux kernel vulnerability leading to root shell access.
Pack2TheRoot, a high-severity vulnerability in PackageKit, allows users to install packages on Linux systems with root ...
A design choice in the MCP SDKs allows remote code execution across the AI supply chain.
It was intended as a technological milestone for youth protection: an EU app that verifies age without sacrificing privacy. However, just hours after its presentation by Commission President Ursula ...
New IBM security services aim to help enterprises identify risks introduced by frontier AI models that can discover vulnerabilities and launch autonomous attacks. IBM announced two services designed ...
This week had real hits. The key software got tampered with. Active bugs showed up in the tools people use every day. Some attacks didn’t even need much effort because the path was already there. One ...
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL ...