A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
A new infostealer variant targets macOS users by spoofing Apple, Microsoft, and Google and then then gets to work searching ...
Cybercriminals are increasingly relying on social engineering instead of traditional exploits, and Australian authorities are ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...
ClickFix relies on tricking users into essentially hacking themselves by running commands that compromise their computers. In ...
Technology that helps write computer code is not new, but advances in generative AI (GenAI) and agentic AI have catapulted ...
Fake OpenAI Privacy Filter hit #1 on Hugging Face with 244,000 downloads, spreading infostealer malware to Windows users.
Ghostwriter’s March 2026 Ukraine attacks use PDF lures and geofencing to deploy Cobalt Strike on government targets.
In a rare interview, Commander Robert Brovdi shared how his unit accounts for a third of all targets destroyed on the battlefield.