The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals...
A new software supply chain attack campaign has been observed using sleeper packages as a...
In yet another software supply chain attack, threat actors have managed to compromise the popular...
The internet is noisy this week. We are seeing some wild new tactics, like people...
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes...
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in...
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could...
Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm...
Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related...
Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as...
In February 2026, researchers uncovered a shift that completely changed the game: threat actors are...
Every security team has a version of the same story. The quarter ends with hundreds...
cPanel has released security updates to address a security issue impacting various authentication paths that...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting...
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly...
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise...
A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate...
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like...
Every security program is betting on the same assumption: once a system is connected, the...
Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face’s open-source...
When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve...
A Chinese national accused of being a member of the Silk Typhoon hacking group has...
An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable...
Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell...
Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has...
Everything is dumb again. This week feels broken in a very familiar way. Old tricks...
Poor metrics can render a well-intentioned security operation centre entirely ineffective....
Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting...
A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running...
Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.