First npm worm “Shai-Hulud” released in supply chain attack
A new supply chain attack on npm, the node package manager, has injected the first malware with self-replicating worm behaviour into the JavaScript software registry, security…
A new supply chain attack on npm, the node package manager, has injected the first malware with self-replicating worm behaviour into the JavaScript software registry, security…
Australia urged social media platforms to employ “minimally invasive” methods to check the age of users covered by its world-first teen social media ban, including…
Medibank has gone live with SuccessFactors-powered enterprise service management, with the ambition to set it up as a single system to handle “people queries” and…
CrowdStrike on Tuesday said that it would acquire Pangea, a company specializing in AI security, to expand its Falcon platform with new protections designed for…
A man who pleaded guilty in 2023 for charges related to his work as founder and operator of the notorious BreachForums website was resentenced Tuesday…
Woodside Energy has used the past few years to set up Snowflake as a unified data platform for both structured and time-series data, moving off…
Microsoft’s Digital Crimes Unit coordinated the seizure of 338 domains used by RaccoonO365, a financially motivated threat group that developed and sold phishing kits that…
Conor Brian Fitzpatrick, the 22-year-old behind the notorious BreachForums hacking forum, was resentenced today to three years in prison after a federal appeals court overturned…
Secure document editing protects sensitive data with encryption and compliance tools, while reducing costly breaches and building trust, but the full process goes deeper. Digital…
To tie in with US president Donald Trump’s state visit, the UK and US have agreed to the Tech Prosperity Deal, to boost the development…
New supply chain attack hits npm registry, compromising 40+ packages Pierluigi Paganini September 16, 2025 Researchers uncovered a new supply chain attack targeting the npm…
The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data. The traditional approach to vendor…