Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
In Telegram groups, men are sharing thousands of nonconsensual images of women and girls, buying spyware, and engaging in ...
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
North Korean hackers pushed out malicious updates to a popular open source project by hacking a top developer's computer in a ...
JFrog reports Telnyx PyPI package was poisoned with malware by TeamPCP Malicious update delivered hidden .wav payload that ...
Isn’t there some claim events come in threes? After the extremely rare leak of the iOS Coruna exploit chain recently, now we have details from Google on a second significant exploit in the ...
Your old laptop is about to outwork that overpriced NAS box ...
U.S. and European law enforcement have seized the database from LeakBase, which prosecutors have touted as “one of the world’s largest online forums for cybercriminals” for sharing stolen passwords ...
A financially motivated threat actor with little technical knowhow used generative AI (GenAI) to breach hundreds of FortiGate instances at scale. While this showcases how AI can scale workflows to ...
President Trump's new TrumpRx online platform is a key part of his plan to help lower drug costs for consumers, with some polls showing two-thirds of Americans report high health care costs as their ...
A ransomware attack on New Zealand’s “ManageMyHealth” (MMH) medical portal, disclosed on New Year’s Day, has exposed sensitive medical records of some 127,000 patients nationwide. The cybercriminal ...