Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Škoda warns of customer data breach after online shop hack
HIGHŠkoda Auto's Online Shop Breach Exposes Customer Data
Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
HIGHUnanswered SOC Alerts: A Hidden Threat to Security Operations
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
HIGHNew TrickMo Variant Exploits TON C2 for Android Network Pivots
Why Agentic AI Is Security's Next Blind Spot
HIGHAgentic AI: The Emerging Security Blind Spot
CRITICAL: SAP fixes critical vulnerabilities in Commerce Cloud and S/4HANA
CRITSAP Patches Critical Vulnerabilities in Commerce Cloud and S/4HANA
Shai Hulud attack ships signed malicious TanStack, Mistral npm packages
HIGHShai-Hulud Supply Chain Attack Targets Developers with Malicious npm Packages
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
HIGHMini Shai-Hulud Worm Targets Supply Chain with NPM and PyPI Package Compromises
Instructure reaches 'agreement' with ShinyHunters to stop data leak
HIGHInstructure Strikes Deal with ShinyHunters to Prevent Data Leak
OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
HIGHOpenAI Unveils Daybreak for Enhanced AI-Driven Cybersecurity
Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
HIGHInstructure Strikes Ransom Deal to Prevent Massive Canvas Data Leak
Official CheckMarx Jenkins package compromised with infostealer
HIGHCompromised Checkmarx Jenkins Plugin Poses Infostealer Threat
GM agrees to $12.75M California settlement over sale of drivers’ data
GM Settles for $12.75M Over Alleged CCPA Violations
Showing 37-48 of 1271 articles