Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have…
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
Feb 03, 2025Ravie LakshmananOpen Source / Software Security The maintainers of the…
Allen AI’s Tülu 3 Just Became DeepSeek’s Unexpected Rival
The headlines keep coming. DeepSeek's models have been challenging benchmarks, setting new…
Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution
Jan 04, 2025Ravie LakshmananVulnerability / Software Security A high-severity security flaw has…
Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT
Cybersecurity researchers have discovered a malicious package on the npm package registry…
Cryptocurrency Miner Found in PyPI Versions
Dec 07, 2024Ravie LakshmananSupply Chain Attack / Cryptocurrency In yet another software…
Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks
Dec 06, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed multiple…
Researchers Uncover Backdoor in Solana’s Popular Web3.js npm Library
Dec 04, 2024Ravie LakshmananSupply Chain Attack Cybersecurity researchers are alerting to a…
From Logs to Runtime Protection
Nov 28, 2024The Hacker NewsCloud Security / Threat Detection Serverless environments, leveraging…


