Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes ...
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
The threat landscape in 2025 was characterized by a surge in compromised credentials, extortion and vulnerability ...
Agentic AI sees organizations moving from managing system risk to managing decision risk, and that is a far more complex ...
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the ...
One-in-four (24%) healthcare organizations (HCOs) experienced cyber-attacks impacting medical devices over the past year, ...
Two ransomware groups are licking their wounds and rebuilding their infrastructure after leaking each other’s operational ...
Medical device giant Medtronic has confirmed a data security incident affecting its corporate IT systems following claims by ...
Many of the most common metrics used to measure the effectiveness of the security operations center (SOC) are at best ...
Itron, a global technology provider for the utilities industry, has disclosed it suffered a cybersecurity breach. In an 8-K ...
A Cambodian network accused of orchestrating large-scale cryptocurrency fraud has been hit with US sanctions targeting senior ...
A suspected state-linked hacker accused of targeting US organizations and COVID-19 research has been extradited to the US, ...