A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into ...
Researchers at security company Varonis have uncovered a crafty new Gmail phishing attack that not only masquerades as a PDF ...
The JavaScript development community faced one of its most sophisticated supply chain attacks in September, when a ...
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat ...
Two malicious packages with nearly 8,500 downloads in Rust's official crate repository scanned developers' systems to steal ...
The foundations said in their blog post that automated CI systems, large-scale dependency scanners, and ephemeral container ...
Process improvements and a closer look at funding streams will provide far more protection for the open source software we ...
Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world ...
A Dune-inspired worm recently hit CrowdStrike and npm, infecting hundreds of packages. Here's what happened - and how to protect your code.
In light of recent cyberattacks and growing security concerns, GitHub is taking immediate and direct action to secure the ...
North Korea’s Contagious Interview spreads AkdoorTea and TsunamiKit to steal crypto and infiltrate global developers.
The security researchers who discovered the malicious npm package called it the “first malicious MCP in the wild” ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results