The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
CanisterWorm infects 28 npm packages via ICP-based C2, enabling self-propagation and persistent backdoor access across ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and ...
Chainguard is expanding beyond open-source security to protect open-core software, AI agent skills, and GitHub Actions.
ClickFix campaigns spread MacSync macOS infostealer via malicious Terminal commands since Nov 2025, targeting AI tool users ...
Abstract: Open Radio Access Network (O-RAN) and modern Fifth Generation Mobile Networks (5G) Standalone (SA) deployments increase protocol complexity and broaden the attack surface of cellular ...
Americans’ personal data — including names, Social Security numbers and addresses — are in the middle of a national-security disaster and should be investigated by Congress, says one Social Security ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
The disappearance of "Today" host Savannah Guthrie's mother has put a spotlight on home security systems, and what type of security cameras you should be looking at for your own home. Doorbell cameras ...