Security
Axios npm Package Compromised in Supply Chain Attack
Two versions of the widely used Axios HTTP client library were found to contain malicious code this week, following a compromise of a developer account on...
-
Security
/ 12 hours agoSOC Process Improvements Boost Tier 1 Analyst Productivity
security operations centers globally are identifying process inefficiencies, not just sophisticated threats, as a primary barrier to analyst productivity. According to...
-
Security
/ 12 hours agoTelecom Espionage, AI Vulnerabilities, and UK Age Verification Updates
Legal proceedings have begun against alleged long-term espionage operations within telecommunications infrastructure, while new research demonstrates vulnerabilities in large language models....
-
Security
/ 13 hours agoDeepLoad Malware Uses Social Engineering to Steal Browser Data
A newly identified malware loader, dubbed DeepLoad, is being distributed through a sophisticated social engineering campaign targeting users worldwide. The campaign...
-
Security
/ 13 hours agoOpenAI Fixes Critical ChatGPT Data Leak and GitHub Token Flaw
A significant security vulnerability in OpenAI‘s ChatGPT allowed unauthorized extraction of user conversation data, according to research from cybersecurity firm Check...
-
Security
/ 1 day agoChina-Linked Hackers Target Southeast Asian Government
A government organization in Southeast Asia has been targeted by three distinct threat clusters with links to China. The operation, described...
-
Security
/ 1 day agoRussian Malware CTRL Hijacks RDP via Phishing LNK Files
cybersecurity researchers have identified a new remote access toolkit of Russian origin being distributed through malicious Windows shortcut files. The malware,...
-
Security
/ 1 day agoSecrets Sprawl Accelerates, Hits Record High in 2025
The exposure of sensitive digital credentials, known as secrets sprawl, reached a new record in 2025, according to an annual industry...
-
Security
/ 3 days agoIranian Hackers Breach FBI Director’s Email, Attack Stryker
Threat actors linked to Iran have successfully compromised the personal email account of a senior U.S. Federal Bureau of Investigation official...
-
Security
/ 3 days agoCISA Flags Actively Exploited F5 BIG-IP APM Vulnerability
The U.S. cybersecurity and Infrastructure Security Agency (CISA) added a critical security flaw in F5’s BIG-IP Access Policy Manager software to...

