Open-Source Library Supply Chain Compromise Exposes Crypto Developer Credentials
A self-replicating worm, 'Shai Hulud,' has poisoned core JavaScript libraries, weaponizing the open-source supply chain to steal developer wallet keys and secrets.
Cardano Network Suffers Chain Split from Legacy Transaction Validation Flaw
A legacy validation bypass in delegation transaction processing created a network partition, exposing systemic risk to blockchain consensus integrity.
Unpatched Ray AI Framework Flaw Exploited to Launch Global Cryptomining Botnet
Critical unauthenticated Ray API access allows threat actors to weaponize compute clusters for self-propagating, illicit cryptojacking.
Malicious NPM Packages Hijack Developer Dependencies to Steal Crypto
Software supply chain integrity is compromised as cloaked malware in open-source dependencies redirects users to wallet-draining phishing sites.
Open-Source Registry Polluted by Automated Token Farming Supply Chain Attack
An unprecedented supply chain attack polluted the npm registry with 150,000 malicious packages to exploit a token reward system, demonstrating critical open-source risk.
NPM Supply Chain Compromise Enables Widespread Cryptocurrency Wallet Drains
A phishing-induced compromise of a critical NPM developer account injected malicious code, enabling silent cryptocurrency address substitution during transactions.
