A phishing campaign targeting healthcare, government, hospitality, and education sectors uses several evasion techniques to ...
The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
New AI-powered scanner -- who-touched-my-packages -- detects zero-day malicious packages and credential exfiltration in seconds BOSTON, March 26, 2026 /PRNewswire/ -- Point Wild, a leading global ...
Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
An incident of LinkedIn malware means jobseekers and employers need to take more care with their applications and ...
Malwarebytes discovered Infiniti Stealer - a new piece of malware targeting macOS devices.
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
A newly documented BlankGrabber infection chain is using a bogus “certificate” loader to disguise a multi-stage Windows compromise, adding another layer of deception to a commodity stealer already ...
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar ...
Anthropic is scrambling to contain the leak, but the AI coding agent is spreading far and wide and being picked apart.
Anthropic leaked 512,000 lines of Claude Code source via npm, its second security lapse in days as the $350B startup eyes a ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...