A new wave of the Mini Shai-Hulud campaign compromised dozens of TanStack npm packages as part of a broader supply chain ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
Google researchers found evidence in the exploit’s code that it may have been created using AI, like a ‘hallucinated’ CVSS ...
Cybercriminals used an AI model to find and weaponize a previously unknown software flaw, Google's threat team confirmed ...
Hyunwoo Kim, also known as "V4bel," recently disclosed "Dirty Frag," a dangerous security vulnerability that provides local ...
Criminal hackers have used artificial intelligence to develop a working zero-day exploit, the first confirmed case of its ...
What happened?: Attackers took over a maintainer account for Axios and published malicious versions to npm, potentially impacting millions of downloads. Why it matters: CSA Singapore warns supply ...
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
Critical cPanel flaw under attack, Copy Fail Linux privilege escalation, TeamPCP supply chain campaign, GitHub RCE & major ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...