The activity centres on unauthenticated ComfyUI deployments and the platform’s custom node ecosystem, which lets users add ...
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
Supply chain attacks feel like they're becoming more and more common.
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of ...
New AI-powered scanner -- who-touched-my-packages -- detects zero-day malicious packages and credential exfiltration in seconds BOSTON, March 26, 2026 /PRNewswire/ -- Point Wild, a leading global ...
ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are ...
Note: Replace your-org and the repo name in the Tests badge URL with your GitHub org/repo to show CI status. A static application security testing (SAST) tool for scanning local source-code ...
Three auth modes: form-based login (auto-detects the form, handles CSRF tokens), cookie injection, and Bearer/API token injection. The crawler and all detectors run with the authenticated session, so ...