OpenAI says malware tied to the Shai-Hulud supply chain attack accessed internal repositories after infecting two employee ...
OpenAI confirmed on Wednesday that it found no evidence suggesting user data was compromised following a security incident ...
A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by ...
OpenAI launches Daybreak to compete with Anthropic's Claude Mythos AI model in finding and fixing vulnerabilities in record ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. As of writing, ...
A major decentralized finance (DeFi) hack could prompt Wall Street firms to reassess the pace of their blockchain and tokenization efforts, a Jefferies analyst wrote in a report. The note follows a ...
LayerZero said that Kelp’s DVN setup caused the $290 million exploit, as investors questioned which protocol would step up to cover the shortfall. Interoperability protocol LayerZero claims that an ...