Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
Meta has indefinitely paused work with $10B AI data startup Mercor after a LiteLLM supply chain attack exposed training ...
Research by Israeli cybersecurity company Check Point found a weakness in ChatGPT’s system that could allow someone to ...
AI hiring startup Mercor confirmed it was "one of thousands of companies" affected by the LiteLLM supply-chain attack as the ...
IntroductionOn March 31, 2026, Anthropic accidentally exposed the full source code of Claude Code (its flagship ...
Google Threat Intelligence Group warns of active supply chain attack on npm’s Axios library Malicious dependency ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
According to Google researchers, a North Korean group tracked as UNC1069 has previously targeted cryptocurrency and ...
The stolen credentials also granted access to the Google Cloud storage buckets within the tenant project in which a Vertex ...
Security teams are scrambling after two malicious releases of the Telnyx Python SDK were uploaded to PyPI on March 27, turning a widely used developer tool into a credential-stealing backdoor that ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results