The design flaw in Flowise’s Custom MCP node has allowed attackers to execute arbitrary JavaScript through unvalidated ...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Abstract: This paper addresses the evaluation of software quality through the use of code analysis metrics. Software quality is critical to ensuring functionality, reliability, and maintainability, ...
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
Anthropic has accidentally exposed Claude Code's full 512,000-line TypeScript source via an npm source map, revealing ...
An attacker compromised the npm account of a lead Axios maintainer on March 30, and used it to publish two malicious versions ...
Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building ...
When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As ...
Vulnerabilities tracked through Common Vulnerabilities and Exposures (CVE) records are increasing at a record pace. In the first half of 2025, over 130 CVEs were disclosed per day—an 18% increase year ...
Shekar Munirathnam is a Senior Advanced Cyber Security Architect specializing in Identity and Access Management and Enterprise Security Architecture ...
The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack. The payload can intercept cryptocurrency wallet addresses entered on ...
Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible ...