Hyunwoo Kim, also known as "V4bel," recently disclosed "Dirty Frag," a dangerous security vulnerability that provides local ...
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company ...
Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
Criminal hackers have used artificial intelligence to develop a working zero-day exploit, the first confirmed case of its ...
Google has identified the first zero-day exploit likely developed by artificial intelligence, marking a new era in cyber warfare. The exploit targeted two-factor authentication (2FA) and featured code ...
What happened?: Attackers took over a maintainer account for Axios and published malicious versions to npm, potentially impacting millions of downloads. Why it matters: CSA Singapore warns supply ...
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
Critical cPanel flaw under attack, Copy Fail Linux privilege escalation, TeamPCP supply chain campaign, GitHub RCE & major ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
The cryptocurrency industry is facing a severe security crisis. In just under 20 days, digital asset platforms have lost more than $605 million to cyberattacks. The latest and most devastating ...