The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
CTI-REALM is Microsoft’s open-source benchmark that evaluates AI agents on real-world detection engineering. It measures whether an agent can take cyber threat intelligence (CTI) and produce validated ...
Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching cycles.
Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and ...
Chainguard is racing to fix trust in AI-built software - here's how ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
A method for exfiltrating sensitive data from AI-powered code execution environments using domain name system (DNS) queries has been demonstrated by security researchers, highlighting potential risks ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.