The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
Anthropic is trying to remove details about its coding agent from GitHub, but programmers are converting the code into ...
CERT-EU attributed a 92 GB data breach at the European Commission to TeamPCP, which compromised the Trivy security scanner in ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
A simple prompt sent Claude Code on a mission that uncovered major security vulnerabilities in popular text editors — and ...
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO ...
Among the wildest revelations in Claude Code's recent leak is that the AI coding tool is scouring user inputs for signs of ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more ...
AI hiring startup Mercor confirmed it was "one of thousands of companies" affected by the LiteLLM supply-chain attack as the ...
M stolen after six-month DPRK social engineering campaign began fall 2025, exposing Drift’s contributors and cloud assets.