News

Upcoming Events

All times are Eastern Time (GMT/UTC -4h)

Anthropic secretly installs spyware when you install Claude Desktop
Claude Desktop reached into a browser from a separate vendor, and registered a back door for a browser extension...Read more

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
not an isolated Docker Hub incident, but part of a broader supply chain compromise affecting multiple Checkmarx distribu...Read more

OpenAI now lets you screenshot your privacy in the foot
Make your model smarter through self-surveillance...Read more

Claude Mythos, Vercel, and the AI Cybersecurity Wake-Up Call
Two very different incidents. One clear message: AI is no longer an experiment — it’s an attack surface....Read more

Vercel Hacked: How One Infected Laptop Compromised a Billion Dollar Platform
The attackers never directly targeted Vercel’s systems. Instead, they used a 3rd-party called Context.ai to get in...Read more

Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
vulnerable encryption cipher that Windows has supported by default for 26 years more than a decade of devastating hacks...Read more

Anthropic's Project Glasswing CVE tally is still anyone's guess
Like the majority of the companies participating, it remains a mystery...Read more

Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
Quantum computers are coming and will "take years to be fully quantum-safe, if ever," cryptography expert warns....Read more

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
Security teams can't test distributed denial-of-service defenses in a vacuum. Test during high demand...Read more

Legitify: Open-source scanner for security misconfigurations on GitHub and GitLab
addresses that gap by scanning GitHub and GitLab environments and reporting policy violations across orgs, repositories...Read more

Ancient Excel bug comes out of retirement for active attacks
Vuln old enough to drive lands on CISA's exploited list...Read more

Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug
compromised for more than 30 days,researchers watched the actor work through tools, scripts and decisions beyond breakin...Read more

Not all networks can handle AI traffic – and experts are sounding alarms
many organizations are not prepared – including some of the so-called neocloud providers offering AI services....Read more

The n8n n8mare: How threat actors are misusing AI workflow automation
how threat actors are weaponizing legitimate automation platforms to facilitate sophisticated phishing campaigns...Read more