GlassWorm malware uses a Zig-based dropper to infect developer tools, stealing data and spreading across IDEs.
AI coding will accelerate innovation across every industry. That acceleration doesn't diminish application security; ...
GlassWorm uses a fake WakaTime VS Code extension to infect IDEs, deploy RATs, and steal data, prompting urgent credential ...
Clash Royale is a PvP strategy game where you go head-to-head against other players, using cards to deploy units to attack your enemies’ base while defending your own. Below, you’ll find a list of all ...
Security teams are grappling with a major supply chain attack on Axios, a popular JavaScript library with over 100 million ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
The exposure traces back to version 2.1.88 of the @anthropic-ai/claude-code package on npm, which was published with a 59.8MB ...
Anthropic's Claude Code source has leaked via a packaging error, exposing anti-distillation traps, an undercover mode, and ...
Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, ...
The leak provides competitors—from established giants to nimble rivals like Cursor—a literal blueprint for how to build a ...
An attacker compromised the npm account of a lead Axios maintainer on March 30, and used it to publish two malicious versions ...
Abstract: Internet of Things (IoT) and direct-access Satellite IoT (SIoT) systems demand short block-length communication to accommodate brief transmissions under ...