The UAT-10608 hacking group is using automated scanning and scripts to exploit React2Shell in a large-scale credential ...
Cisco has patched eight critical and high-severity vulnerabilities that could lead to bypasses, code execution, and privilege ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Mercor says it has been impacted by the LiteLLM supply chain attack as Lapsus$ has auctioned 4TB of data allegedly stolen ...
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
Google has announced a Chrome 146 update that patches 21 vulnerabilities, including a zero-day that has been exploited in the ...
T-Mobile USA has provided clarification on a recent data breach notification, stating that it was an insider incident with ...
North Korean hackers drained over $285 million from five Drift vaults in 10 seconds in a carefully prepared crypto heist.
European Commission disclosed a data breach after hackers published information stolen from AWS using a key compromised in ...
A Chinese threat actor was caught exploiting CVE-2026-3502, a zero-day vulnerability in TrueConf, to hack an Asian government ...
Depthfirst has raised $80 in Series B funding and launched its first in-house security model to secure cryptocurrency smart ...
Mobile security risks are increasing as enterprises struggle with outdated devices, risky apps, and expanding attack surfaces ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results