This is GlassWorm: a software supply chain attack that security researchers are calling one of the most sophisticated and ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
Google Threat Intelligence Group warns of active supply chain attack on npm’s Axios library Malicious dependency ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Up to four npm packages on Axios were replaced with malicious versions, in one of the most sophisticated supply chain attacks ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
Claude extension flaw allowed zero click attacks, letting hackers inject commands and access sensitive user data.
Claude extension flaw enabled silent prompt injection via XSS and weak allowlist, risking data theft and impersonation until ...
The OWASP Top 10 for LLM Applications is the most widely referenced framework for understanding these risks. First released in 2023, OWASP updated the list in late 2024 to reflect real-world incidents ...
OpenAI's new IH-Challenge training dataset improves LLM instruction hierarchy by up to 15%, strengthening defenses against prompt injection and jailbreak attempts. OpenAI has released IH-Challenge, a ...
OpenAI details new 'Safe Url' defense system treating AI prompt injection like social engineering, with attacks succeeding 50% of the time before fixes. OpenAI published technical details on March 16 ...