In January, Jake Lee and I wrote an article about the merits of using 17 U.S.C. § 1201 to sue video game hack developers.[1] Importantly, § 1201 can be asserted separately from traditional copyright ...
GlassWorm, a known malware, has put 73 harmful extensions into OpenVSX's registry. Hackers use it to steal developers' crypto ...
Self-propagating npm worm steals tokens via postinstall hooks, impacting six packages and expanding supply chain attacks.
A core developer working for Solana-based (CRYPTO: SOL) decentralized exchange, Cypher, admitted to misappropriating funds worth more than $300 million meant to compensate victims of a sensational ...
Breach tied to compromised AI tool may have exposed credentials used by app frontends, the user-facing layer that connects ...
If you were a maturing technology company, where would you look to recruit top-tier engineering talent? College campuses? Craigslist? LinkedIn? Try the hacker world. George Hotz, 21, isn’t only the ...
A potential security crisis was narrowly avoided after a hacker exploited a developer's access token to inject malicious code into a key toolkit used by applications on the XRP Ledger. The ...
The maker of Pokemon has confirmed it was a victim of a hack that resulted in a substantial data leak that has revealed details about the Nintendo Switch 2, employee personal information, game source ...
A widely used PyPI package, 'elementary-data', was compromised through a malicious update that inserted infostealer code via a GitHub Actions workflow. The breach potentially exposed SSH keys, cloud ...