A phishing campaign targeting healthcare, government, hospitality, and education sectors uses several evasion techniques to ...
Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were ...
The GlassWorm malware made news when it pivoted from exclusively targeting Windows users to also targeting Mac OS users in January, and in the time since, the malware campaign has spread across at ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
Learn how to protect Model Context Protocol (MCP) from quantum-enabled adversarial attacks using automated threat detection ...
AI has made cyberwar fast, cheap and autonomous, reshaping power and security for states, companies and criminals ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results