A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack ...
Joy Ebertz, Principal Engineer at Imprint, presented at QCon London 2026 a groundbreaking framework for prioritizing ...
LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of ...
A massive scam campaign, dubbed FriendlyDealer, is using fake app stores to trick victims into installing bookmarks that act ...
Security must be grounded in the “here and now” rather than implicitly clinging to the “tried and true” of yesterday.
Hospital cyberattacks are surging. AI impersonation targets staff and patients. Here’s how to protect your medical identity ...
The big picture: A cybercriminal is reportedly selling a Windows zero-day exploit on the dark web for $220,000. The vulnerability, which targets Windows Remote Desktop Services, could allow an ...
Attackers weaponized critical RCE within hours, prompting CISA to add the flaw to its KEV catalog and set an urgent patch ...
Five retail misconfigurations that expose customer data, from public file paths to misaligned identity policies and MFA gaps.
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a cross-platform RAT. Axios sits in 80% of cloud environments. Huntress confirmed ...
Google Threat Intelligence Group (GTIG), Lookout Threat Labs, and iVerify published coordinated research in March 2026 on ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver ...