Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
IntroductionOn March 31, 2026, Anthropic accidentally exposed the full source code of Claude Code (its flagship ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver ...
I keep reaching for my phone, and it’s not for scrolling.
Chainguard is racing to fix trust in AI-built software - here's how ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
Every conversation you have with an AI — every decision, every debugging session, every architecture debate — disappears when ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
OpenAI announced they are extending the Responses API to make it easier for developer to build agentic workflows, adding ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how ...
A practical, hands-on guide to navigating deepfake technology and reducing the risks it poses to your business.