A critical-severity vulnerability in the vm2 Node.js sandbox library, tracked as CVE-2026-22709, allows escaping the sandbox and executing arbitrary code on the underlying host system.
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
Key takeawaysThe December 2025 Trust Wallet hack shows that vulnerabilities in crypto tools can affect crypto-friendly SMEs, even when attacks target individual users rather than ...
Hackers have exploited a flaw in the React JavaScript library to inject code that drains crypto wallets onto websites, primarily on cryptocurrency platforms. The React team released a patch on ...
The Satoshi Nakamoto Institute has launched a fundraising campaign to build the Library of Bitcoin, a project dedicated to preserving Bitcoin’s ideas, history, and foundational documents before they ...
FIL consolidated with an $0.11 range representing 7.5% of the token's value, according to CoinDesk Research's technical analysis model. The critical development emerged from Filecoin's relative ...
The UK’s Royal Navy has bought a fleet of Remus 300 unmanned underwater vehicles from US defence contractor HII. Photo: HII A popular JavaScript cryptography library is vulnerable in a way which could ...
A malicious Chrome extension called Crypto Copilot lets users trade Solana directly from X but secretly skims a small portion of the transaction. A malicious Google Chrome browser extension is letting ...
A new JavaScript supply-chain attack has compromised more than 400 software packages, including at least 10 heavily used in the cryptocurrency sector. The ongoing infection, driven by the “Shai Hulud” ...
Red Hat today announced multiple product updates across its Linux, OpenShift and artificial intelligence portfolios, focusing on hybrid cloud performance, post-quantum security and developer ...
A critical vulnerability in the popular expr-eval JavaScript library, with over 800,000 weekly downloads on NPM, can be exploited to execute code remotely through maliciously crafted input. The ...