Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
In Telegram groups, men are sharing thousands of nonconsensual images of women and girls, buying spyware, and engaging in ...
The Russian military is once again hacking home and small office routers in widespread operations that send unwitting users ...
Fancy Bear, also known as APT28, has taken over thousands of residential home routers to steal passwords and authentication ...
An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, ...
Cybercriminals are exploiting the recent Claude Code source code leak to distribute Vidar malware via fake GitHub repositories.
With new systems from companies like Anthropic and OpenAI, hackers can attack with greater speed. The defense is more A.I.
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
Strapi plugins exploit Redis and PostgreSQL via postinstall scripts, enabling persistent access and data theft.