It's not clear how many people were compromised by this hacking campaign, but a security researcher said the hackers were ...
At least two ships have visited Iranian ports while two are linked to China. The US previously said it would stop vessels ...
FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from ...
A newly discovered Adobe Reader zero-day vulnerability allows malicious PDF files to steal local data and potentially lead to ...
Adobe Reader zero-day exploited since Dec 2025 via malicious PDFs, enabling data theft and potential RCE, prompting urgent ...
Jones Day – which is headquartered in the United States but has offices globally, including in Sydney – disclosed the attack ...
In-house software built in March with open-source components may include malware placed there by criminals. This isn’t a ...
Threat actors can use malicious web content to set up AI Agent Traps and manipulate, deceive, and exploit visiting autonomous ...
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
North Korean hackers just compromised a massively popular tool to steal crypto. Find out if your business downloaded this ...
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
Google patches 21 Chrome vulnerabilities, including an actively exploited zero-day flaw that could enable code execution and ...