AI chatbots make it possible for people who can’t code to build apps, sites and tools. But it’s decidedly problematic.
Shadow AI 2.0 isn’t a hypothetical future, it’s a predictable consequence of fast hardware, easy distribution, and developer ...
UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
TeamPCP strikes again, with almost identical code to LiteLLM.
New AI-powered scanner -- who-touched-my-packages -- detects zero-day malicious packages and credential exfiltration in seconds BOSTON, March 26, 2026 /PRNewswire/ -- Point Wild, a leading global ...
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.
CERT-EU attributed a 92 GB data breach at the European Commission to TeamPCP, which compromised the Trivy security scanner in ...
PM This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.
GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks. The developer ...