Several security vulnerabilities, some classified as high-risk, have been discovered in the popular JavaScript runtime ...
A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing arbitrary code on the underlying host system.
A flaw in the binary-parser npm package before version 2.3.0 lets attackers execute arbitrary JavaScript via unsanitized parser input.
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
Developers now need to be careful with job offers. Criminals are trying to distribute infostealers through them.
Microsoft’s new winapp CLI simplifies Windows app development with one-command setup, faster testing, and easier packaging.
According to the firm’s latest supply chain security report, there was a 73% increase in detections of malicious open-source packages in 2025. The past year also saw a huge jump in the scope of ...
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no ...
Android malware uses AI to trick traditional defenses ...
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy ...
Researchers at cybersecurity company Group-IB found that DeadLock, a ransomware family discovered in July 2025, is now using smart contracts, or self-executing programs, on the popular Polygon (POL) ...