Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
A newly discovered third variant of the Shai Hulud malware is raising fresh concerns about the security of the open-source software supply chain, as researchers warn that the latest version shows more ...
Infosecurity has selected five of the most significant vulnerability exploitation campaigns of 2025 that led to major ...
The human layer is one of the most vulnerable when it comes to crypto security, but authentication, hardware wallets, automation and strict verification habits are key to reducing risk.
An attacker seized control of Unleash Protocol’s multisig governance to upgrade contracts and siphon funds, which were later ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating 'fake glitches' on ...
Hackers behind the Shai Hulud malicious npm JavaScript campaign are likely testing a new variant of the malware. Security ...
A critical LangChain AI vulnerability exposes millions of apps to theft and code injection, prompting urgent patching and ...
Kaspersky finds 15 malicious GitHub repositories posing as proof‑of‑concept exploits, some crafted with Gen AIVictims receive a ZIP with decoys and a dropper (rasmanesc.exe) that installs WebRAT ...