Supply chain attacks feel like they're becoming more and more common.
Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of ...
During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude ...
ShellGPT makes the terminal user-friendly, saving time by generating commands, automating scripts, and guiding me through tasks.
Smartphones have indisputably changed how we drive. While dodging distracted drivers playing Candy Crush at 70 MPH is a ...
Cloudflare says dynamically loaded Workers are priced at $0.002 per unique Worker loaded per day, in addition to standard CPU ...
Claim your complimentary copy (worth $28) of "Between You and AI: Unlock the Power of Human Skills to Thrive in an AI-Driven ...
A practical, hands-on guide to navigating deepfake technology and reducing the risks it poses to your business.
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
On March 19, 2026, a threat actor known as TeamPCP compromised Aqua Security’s Trivy vulnerability scanner – the most widely adopted open-source scanner in the cloud-native ecosystem. The attacker ...
North Korean hackers exploit VS Code tasks.json auto-run since Dec 2025 to deploy StoatWaffle malware, stealing data and ...