Malicious JavaScript code delivered by the AppsFlyer Web SDK hijacked cryptocurrency, potentially in a supply-chain attack.
Jacksonville-based Urban SDK, a technology company that creates software for governments, announced Feb. 5 that it received a $65 million investment from Riverwood Capital. Urban SDK says its ...
Technology investor Riverwood Capital is backing software company Urban SDK, betting that geospatial artificial intelligence will supercharge how smaller cities respond to such things as natural ...
Apple informed developers today of an upcoming update to the minimum Software Development Kit (SDK) requirements for iOS, iPadOS, tvOS, visionOS, and watchOS apps. Here are the details. Apple has ...
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider's own GitHub repositories, including its AWS JavaScript SDK, ...
A critical misconfiguration in AWS CodeBuild has allowed attackers to seize control of core AWS GitHub repositories, including the JavaScript SDK that underpins the AWS Console. The issue, dubbed ...
With the open-source Dataverse SDK for Python (announced in Public Preview at Microsoft Ignite 2025), you can fully harness the power of Dataverse business data. This toolkit enables advanced ...
The first preview release of the Swift SDK for Android was published this week, allowing developers to build Android apps in Swift with official tooling and making it easier to share code across iOS ...
Following the announcement of the Android Workgroup earlier this year, the first preview release of the Swift SDK for Android was just rolled out. Here are the details. “This milestone reflects months ...
An advanced persistent threat (APT) group, Flax Typhoon, was able to gain persistent access to the mapping tool ArcGIS for over a year, putting several enterprises at risk. ArcGIS is a geospatial ...
Security teams have been urged to adopt proactive threat hunting after a new report revealed how Chinese hackers used novel techniques to turn trusted software components into persistent backdoors.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results