OpenAI confirmed on Wednesday that it found no evidence suggesting user data was compromised following a security incident ...
OpenAI launches Daybreak to compete with Anthropic's Claude Mythos AI model in finding and fixing vulnerabilities in record ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. As of writing, ...
A major decentralized finance (DeFi) hack could prompt Wall Street firms to reassess the pace of their blockchain and tokenization efforts, a Jefferies analyst wrote in a report. The note follows a ...
LayerZero said that Kelp’s DVN setup caused the $290 million exploit, as investors questioned which protocol would step up to cover the shortfall. Interoperability protocol LayerZero claims that an ...
The contagion from the Kelp exploit could have been contained, but at the cost of capital efficiency, according to the founder of Curve Finance. The exploit of the Kelp liquid restaking protocol shows ...
Get your news from a source that’s not owned and controlled by oligarchs. Sign up for the free Mother Jones Daily. Minnesota’s Boundary Waters comprise a vast stretch of wilderness bordering Canada, ...