-
Security
/ 1 month agoCritical n8n Vulnerabilities Enable Remote Code Execution
cybersecurity researchers have disclosed two critical security vulnerabilities in the n8n workflow automation platform that have now been patched. The flaws,...
-
Security
/ 1 month agoAI Browser Tricked into Phishing Scam in Under Four Minutes
Security researchers have demonstrated that an AI-powered web browser can be manipulated into performing a phishing scam in less than four...
-
Security
/ 1 month agoMalicious Rust Crates Target Developer Secrets via CI/CD
Cybersecurity researchers have identified a coordinated campaign involving five malicious software packages, or “crates,” in the Rust programming language ecosystem. These...
-
Security
/ 1 month agoSupply Chain Attack via nx npm Package Leads to AWS Breach
A threat actor identified as UNC6426 used credentials stolen during a software supply chain attack to gain administrative control over a...
-
Security
/ 1 month agoMicrosoft Fixes 84 Security Holes, Two Zero-Days in March Update
Microsoft released its monthly security updates on Tuesday, addressing a total of 84 newly discovered vulnerabilities across its software ecosystem. The...
-
Security
/ 1 month agoRussian APT28 Group Uses BEARDSHELL, COVENANT Malware Against Ukraine
A Russian state sponsored hacking group known as APT28 has deployed two new malware families, BEARDSHELL and COVENANT, to conduct long...
-
Security
/ 1 month agoReducing Attack Surface Can Mitigate Zero-Day Threats
Security experts are emphasizing that organizations can proactively reduce their risk from critical software vulnerabilities, known as zero-days, by minimizing their...
-
Security
/ 1 month agoGoogle Looker Studio Flaws Allowed Cross-Tenant Data Access
Cybersecurity researchers have disclosed a set of nine critical vulnerabilities in Google Looker Studio, a business intelligence and data visualization platform....
-
Security
/ 1 month agoKadNap Malware Infects 14,000 Devices for Proxy Botnet
Security researchers have identified a new malware campaign that has compromised more than 14,000 network edge devices, primarily Asus routers, to...
-
Security
/ 1 month agoAI Agent Security Risks Prompt Calls for New Audit Protocols
The rapid adoption of autonomous artificial intelligence systems, known as AI agents, has introduced significant new data security vulnerabilities that require...

