资讯

THORSwap offers bounty after $1.2M stolen from THORChain founder’s wallet in phishing scam, confirms protocol remains secure.
A newly discovered malware called ModStealer is targeting crypto wallets across Windows, Linux, and macOS, evading antivirus ...
At this year’s DefCon 33 security conference, security researchers unveiled a major flaw in Apple’s CarPlay system that could ...
The malvertising campaign, per Bitdefender, is designed to push fake " Meta Verified " browser extensions named SocialMetrics ...
On Wednesday afternoon, Anthropic experienced a brief but comprehensive service outage that paralyzed its artificial intelligence infrastructure, preventing developers from accessing Claude.ai, API, ...
AI browsers can do things for you—but handing personal information over comes with security risks. One of these is a prompt ...
Apple's new Memory Integrity Enforcement acts like a shield inside the iPhone 17 and iPhone Air, blocking the memory tricks ...
A serious security scare has hit the open-source software world, and it’s got big implications for crypto. Ledger’s chief ...
At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were ...
A website announces, “Free celebrity wallpaper!” You browse the images. There’s Selena Gomez, Rihanna and Timothée ...
Hackers use Ethereum smart contracts to hide malware in NPM packages, launching a stealthy crypto-themed supply chain attack.
Artificial-intelligence agents—touted as AI’s next wave—could be vulnerable to malicious code hidden in innocent-looking images on your computer screen ...