The ActiveState catalog grew to 40 million components in mid 2025 when it introduced coverage for Java and R in addition to Python, Perl, Ruby, and Tcl. As of January 2026, the company has expanded ...
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...
NPM, the Node Package Manager, hosts millions of packages and serves billions of downloads annually. It has served well over the years but has its shortcomings, including with TypeScript build ...
The Google Threat Intelligence Group says it found an iPhone exploit kit that could crack the device and sniff out crypto wallets, apps and seed phrases to steal funds.
Google and iVerify have shared details about Coruna, an exploit kit that chains multiple vulnerabilities to target iPhones ...
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.
CyberStrikeAI lowers the barrier to complex cyberattacks by combining AI orchestration, MCP integration, and more than 100 ...
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages ...
Tether has released an open-source operating system for bitcoin mining, pitching it as a way to make running mining infrastructure simpler while reducing reliance on closed, vendor-controlled software ...
Tether has unveiled MiningOS (MOS) as part of a broader push to reduce the industry’s reliance on proprietary, vendor-controlled software. Tether has open-sourced a new operating system for bitcoin ...