Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
Isn’t there some claim events come in threes? After the extremely rare leak of the iOS Coruna exploit chain recently, now we have details from Google on a second significant exploit in the ...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to ...
CERT-EU attributed a 92 GB data breach at the European Commission to TeamPCP, which compromised the Trivy security scanner in ...
UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
Anthropic's new initiative, Project Glasswing, unites a dozen major organizations—including Apple, Google, Microsoft, AWS, ...
Free cryptographically verified code quality scoring for software procurement. The best software wins. Not the best ...
The widely used Axios HTTP client library, a JavaScript component used by developers, was recently hacked to distribute ...
The activity centres on unauthenticated ComfyUI deployments and the platform’s custom node ecosystem, which lets users add ...
On the morning of March 24, 2026, tens of thousands of software developers working on AI applications were unknowingly exposed to malware.