The vm2 JavaScript sandbox module maintainers have released a patch to address a severe bug that affects all versions, including and prior to 3.9.14, and could be exploited to breach security boundaries and execute arbitrary shellcode. vm2 is a popular Node.js tool for running untrusted programs in an isolated environment. It is utilized in 721 packages and generates approximately four million weekly downloads. The vulnerability, CVE-2023-29017, has a CVSS score of 9.8 and does not correctly handle errors that occur in asynchronous operations. The release of the fix comes nearly six months after vm2 patched a further significant vulnerability (CVE-2022-36067, CVSS score: 10) that could have been used to perform arbitrary activities on the underlying machine.
In early 2026, Rapid7 observed a sophisticated cyberattack attributed to the Iranian state-sponsored group MuddyWater, masquerading under the Chaos ransomware brand in what appears...
A newly identified China-affiliated cyber espionage group, tracked as UAT-8302, has been linked to a series of intrusions aimed at government institutions across South America and ...
Google has expanded its Binary Transparency initiative for Android to strengthen protection against software supply chain attacks. The new system creates a public cryptographic led...