Social engineering attacks on open source developers are escalating
North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call…
North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call…
Did you know you can be profiled based on the browser extensions you use? Advertisers can detect which extensions are installed and use that to…
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams,…
Microsoft Azure is refusing capacity to cloud customers in the company’s UK South (UKS) region, with issues around the availability of Azure virtual machines (VMs)…
A newly uncovered zero-day attack targeting Adobe Reader has raised alarms across enterprise security teams, as researchers identified an exploit chain that bypasses traditional detection…
The Russian-linked threat group APT28 has continued to leverage vulnerable network devices to carry out large-scale DNS hijacking campaigns, enabling adversary-in-the-middle attacks. Recent developments show that these…
Anthropic has announced an initiative with major technology companies, including Amazon.com, Microsoft and Apple, that lets partners preview an advanced model with cyber security capabilities…
Losses resulting from cyber-enabled crimes went up 26% year-over-year in 2025, narrowly missing the $21 billion mark, according to the latest annual report from the…
Project Glasswing powered by Claude Mythos: defending software before hackers do Pierluigi Paganini April 08, 2026 Anthropic unveiled Claude Mythos, a powerful AI for cybersecurity…
TLDR: We attended Cyber Security 2026: Kritisk infrastruktur in Stockholm, and the reality check was simple: “breakout time” has hit a record low of 22…
Hong Kong police have arrested a man working for a contractor commissioned by the Hospital Authority on suspicion of stealing the personal data of more…
Hackers exploit unpatched instances While a patch has been available for months, a recent VulnCheck finding places the first in-the-wild exploitation on April 6. Caitlin…