Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
HIGHMini Shai-Hulud Worm Targets Supply Chain with NPM and PyPI Package Compromises
Instructure reaches 'agreement' with ShinyHunters to stop data leak
HIGHInstructure Strikes Deal with ShinyHunters to Prevent Data Leak
OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
HIGHOpenAI Unveils Daybreak for Enhanced AI-Driven Cybersecurity
Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
HIGHInstructure Strikes Ransom Deal to Prevent Massive Canvas Data Leak
Official CheckMarx Jenkins package compromised with infostealer
HIGHCompromised Checkmarx Jenkins Plugin Poses Infostealer Threat
GM agrees to $12.75M California settlement over sale of drivers’ data
GM Settles for $12.75M Over Alleged CCPA Violations
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
HIGHCheckmarx Jenkins AST Plugin Compromised by TeamPCP
CRITICAL: Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
CRITAI-Powered Zero-Day 2FA Bypass Unveiled by Hackers
Instructure confirms hackers used Canvas flaw to deface portals
HIGHHackers Exploit Canvas Flaw to Deface Educational Portals
⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More
HIGHWeekly Security Recap: Linux Rootkit and macOS Crypto Stealer Threats Unveiled
CRITICAL: Google: Hackers used AI to develop zero-day exploit for web admin tool
CRITAI-Generated Zero-Day Exploit Targets Open-Source Web Admin Tool
Why Changing Passwords Doesn’t End an Active Directory Breach
HIGHWhy Password Resets Aren't Enough for Active Directory Security
Showing 37-48 of 1166 articles