The US says it targeted Iranian "missile and drone launch sites; command and control locations; and intelligence, ...
The wave of supply chain attacks aimed at security and developer tools has washed up more victims, namely SAP and Intercom ...
When a new asset goes live, attackers start scanning within minutes. Sprocket Security shows how automated attacks move from ...
ThreatDown’s EDR team discovered a sophisticated, multi-stage attack chain during an active investigation; the first documented case of attackers abusing the Deno runtime as a malware execution ...
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
ClaudeBleed, a vulnerability in Claude in Chrome, allows malicious extensions to hijack the AI agent for nefarious purposes.
A midnight phone call from a High Street crime gang, threatening to kill crime investigator Mandy and burn her house down, ...
Effort to formalize control over the channel raises new concerns about eroding the freedom of navigation on which global ...
SAP npm packages poisoned on April 29, 2026 + AES-256-GCM encrypted credential theft + AI coding tools abused for spread.
A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious ...
In Southern Lebanon, Israel’s war with Iran’s proxy Hezbollah has displaced more than a million residents and sent them ...