Developers using the axios package from npm may have downloaded a malicous version that drops a Remote Access Trojan ...
FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from ...
EmDash, the secure serverless CMS successor to WordPress, fixes plugin risks and empowers global publishing in the AI era.
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
USB flash drives are portable data storage options that allow users to store and move files between computers and other devices. Unintentional deletions, virus assaults, formatting errors, or system ...
A data breach at the city attorney's office led to a massive cache of LAPD files being dumped online. Here's what we know ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, ...
Anthropic's Claude Code CLI had its full TypeScript source exposed after a source map file was accidentally included in ...
According to Socket, the extensions (complete list here) are published under five distinct publisher identities – Yana ...
These 108 Chrome extensions have over 20,000 combined downloads, based on a report by The Hacker News. These extensions have ...
Data brokers are helping the FBI get around warrant requirements. Data brokers are helping the FBI get around warrant requirements. is a policy reporter at The Verge covering surveillance, the ...