A compromised Nx Console extension silently harvested developer credentials from password managers, cloud services, and code repositories through a multi stage attack on VS Code users.
A live webinar on June 2, 2026 will demonstrate how AI driven automation can eliminate manual bottlenecks in network incident…
HiddenLayer researchers found that the authentication check in ChromaDB's Python API runs too late, allowing attackers to load and execute…
The SHub malware family's latest variant bypasses Apple security by impersonating Google Software Update and using AppleScript to evade standard…
Four separate spear phishing campaigns used fake resumes and Solana meme coin content to deploy malware through trusted platforms like…
Crypto ATM scams cost American victims more than $388 million in 2025, with the FBI reporting a 58% surge in…
Discord's default encryption for all voice and video calls now covers 200 million monthly active users across desktop, mobile, and…
The convenience store giant confirmed attackers accessed franchisee documents and personal data in early April, with the ShinyHunters group leaking…
The new Windows 11 preview build lets users move the taskbar to any screen edge and toggle off Start menu…
A macOS security update is preventing the operating system from saving location permission choices for the Teams app, causing a…
Palo Alto Networks addresses a critical buffer overflow in PAN OS that attackers have exploited since last month to deploy remote access tools.
The EvilTokens phishing platform exploits OAuth consent grants to bypass multi factor authentication by tricking users into granting persistent refresh…
Grafana Labs refused to pay a ransom after hackers used a stolen GitHub token to access and download the company's…
The operation, spanning 13 countries over five months, identified nearly 4,000 victims and seized 53 servers used to facilitate phishing…
Proof of concept exploit code has been released for a Linux kernel vulnerability that bypasses copy on write protections to allow local privilege escalation on distributions with CONFIG_RXGK enabled.
Microsoft Edge will no longer load saved passwords into process memory at startup, a proactive security improvement under the company's Secure Future Initiative.
Attackers are exploiting a critical authentication bypass flaw in Four-Faith industrial routers to enroll them into botnets for DDoS and proxy attacks.
Attackers silently redirected all version tags of a popular GitHub Action to malicious code that steals pipeline credentials from runner memory.
Custom Python scripts and a trusted cloud storage service were used to silently exfiltrate data from multiple Malaysian government networks…
Seven security holes in SEPPMail's email gateway, including a critical path traversal and eval injection, could let attackers read all…
The Drupal Security Team warns that exploits may emerge within hours of the May 20 patch release.
Anthropic's Mythos Preview AI model can now chain multiple low severity bugs into working proof-of-concept exploits, reducing the time between…
Microsoft acknowledges that the May 2026 Windows 11 cumulative update fails on devices where the EFI System Partition lacks free…
A structured framework helps organizations gain visibility into unapproved AI tools employees are using while providing a clear path for…
Sign in to your account