News

Upcoming Events

All times are Eastern Time (GMT/UTC -4h)

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system...Read more

Adobe Breach – Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records
allegedly gained initial access through an Indian Business Process Outsourcing (BPO) firm contracted by Adobe...Read more

Claude Code bypasses safety rule if given too many commands
A hard-coded limit on deny rules drops automatic enforcement for concatenated commands...Read more

Claude Code Source Leak Reveals How Much Info Anthropic Can Hoover Up About You and Your System
Analysis of Claude code shows that the agent can exercise far more control over people’s computers than even...Read more

The Human Error That Exposed Claude: Inside Anthropic’s Wild AI Source Code Leak
A simple npm packaging mistake at Anthropic leaked 512,000 lines of Claude Code, sparked the Claw Code open-source boom...Read more

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense
A chief medical information officer describes what hospitals face when they inevitably suffer a ransomware attack...Read more

Anthropic tweaks timed usage limits to discourage Claude demand during peak hours
AI biz makes some Claude conversations more costly to manage capacity...Read more

Google Sets 2029 Deadline for Quantum-Safe Cryptography
The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029....Read more

World Leaks data extortion: What you need to know
theft and threat to expose sensitive data - without the use of encryption...Read more

AI frenzy feeds credential chaos, secrets leak through code, tools, and infrastructure
incidents come from tools outside source control, where collaboration platforms such as Slack, Jira, and Confluence...Read more

TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
TeamPCP continues is supply chain compromise rampage, with telnyx on PyPI being the latest maliciously modified package....Read more

https://mkennedy.codes/posts/python-supply-chain-security-made-easy/
How to integrate Python’s “Official” package scanning technology directly into your continuous integration....Read more

How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM
Two versions of litellm Python pkg on PyPI were found to contain malicious code, available for 3 hours before quarantine...Read more

AI-Native Security Is a Must to Counter AI-Based Attacks
Attacks by AI agents are a reality. Experts at Nvidia's GTC conference say defenders need to use the same tools...Read more