Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
GHENT, Belgium, April 20, 2026 (GLOBE NEWSWIRE) -- Aikido Security today launched Aikido Endpoint, a lightweight security agent that protects developer devices against software supply chain attacks by ...
A ClickFix campaign targeting macOS users delivers an AppleScript-based infostealer that collects credentials and live ...
Vercel breached after attacker compromised Context.ai, hijacked an employee's Google Workspace via OAuth, and accessed ...
AI companies are holding back models that could be used in cyber attacks, instead deploying them to build defence systems.
The supply chain attack on third-party library Axios has forced OpenAI to revoke its code-signing certificate and require ...
An attacker purchased 30+ WordPress plugins on Flippa, planted backdoors that lay dormant for eight months, then activated ...
Two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim ...
CISA has added eight more vulnerabilities to the KEV catalog, including Cisco, Kentico, and Zimbra flaws not previously ...
ESET researchers discovered a new NGate malware variant abusing the legitimate Android HandyPay application.To trojanize HandyPay, threat actors most likely used GenAI.The campaign has been ongoing si ...
In a blog post on Wednesday, Mohan Pedhapati (s1r1us), CTO of Hacktron, described how he used Opus 4.6 to create a full ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results