-
Security
/ 2 weeks agoDPRK Hackers Use AI-Designed npm Malware in Supply Chain Attack
cybersecurity researchers have identified malicious code hidden inside an npm package that was generated as a dependency by Anthropic’s Claude Opus...
-
Security
/ 2 weeks agoSAP npm Packages Hit by Credential Stealing Supply Chain Attack
cybersecurity researchers have identified a new supply chain attack campaign that is targeting SAP related npm packages with malware designed to...
-
Security
/ 2 weeks agoBrazilian LofyGang Returns After Three Years With Minecraft Malware Campaign
A cybercrime group originating from Brazil has resurfaced after more than three years of inactivity to launch a campaign targeting players...
-
Security
/ 2 weeks agoCritical GitHub RCE Flaw CVE-2026-3854 Exploitable via Git Push
cybersecurity researchers have disclosed a critical security vulnerability affecting GitHub.com and GitHub Enterprise Server. The flaw, designated as CVE-2026-3854, enables an...
-
Security
/ 2 weeks agoMicrosoft Warns of Active Exploitation in Windows Shell Flaw
Microsoft has revised an advisory for a patched security vulnerability affecting the Windows Shell component, now confirming it is being actively...
-
Security
/ 2 weeks agoEntra ID Flaw Allowed Privilege Escalation via AI Agent Role
A security flaw in a built-in administrative role within Microsoft Entra ID could have Allowed attackers to escalate privileges and take...
-
Security
/ 2 weeks agoSilk Typhoon Hacker Extradited to US Over COVID Research Attacks
A Chinese national accused of being a member of the state-sponsored hacking group Silk Typhoon has been extradited to the United...
-
Security
/ 2 weeks agoZero Day Windows Shrink as AI Finds Exploits Faster Than Patching
The traditional window of opportunity for organizations to patch newly disclosed vulnerabilities is narrowing rapidly, driven by advances in artificial intelligence....
-
Security
/ 2 weeks agoCritical Flaw in Hugging Face LeRobot Enables Unauthenticated Hacking
Security researchers have uncovered a critical vulnerability in LeRobot, an open source robotics platform from Hugging Face, that allows attackers to...
-
Security
/ 2 weeks agoData movement security is the overlooked Zero Trust bottleneck
A new industry report has identified a specific technical bottleneck that may be stalling many enterprise Zero Trust security implementations: the...

