LATEST

FBI Flags Chinese Mobile Apps Over Potential Data Exposure Risks

FBI Flags Chinese Mobile Apps Over Potential Data Exposure Risks

CYBER ATTACKZerowl

As of early 2026, a lot of popular and profitable apps in the US and around the world are made by Chinese companies This article explores likely apps.

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

Microsoft Defender for Endpoint was the first EDR solution to work with CrowdStrike's Falcon Next-Gen SIEM This article explores platform crowdstrike ceo.

Claude Source Code Leak Highlights Big Supply Chain Missteps

Claude Source Code Leak Highlights Big Supply Chain Missteps

More than half a million lines of source code for Anthropic's Claude Code package were made public by mistake This article explores attack software.

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CYBER ATTACKZerowl

The U.S This article explores state cyberattacks cisa. . Cybersecurity and Infrastructure Security Agency (CISA) has added a serious security hole.

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Since the middle of 2025, a cyber actor backed by China has been going after European government and diplomatic groups This article explores diplomatic.

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard launched Factory 2.0, a new version of its tool for handling hardened open-source images and secure software artifacts, components, and images.

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

The European Commission and Mercor have both made public reports about TeamPCP violations This article explores teampcp using stolen. . Threat actors are.

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

CYBER ATTACKZerowl

Researchers found a serious supply chain attack on Axios, a popular HTTP client for JavaScript that gets over 70 million downloads a week This article.

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

CYBER ATTACKZerowl

On March 31, 2026, two versions of the popular JavaScript HTTP library Axios were briefly uploaded to npm This article explores broken versions axios.

Apple breaks the rules and fixes DarkSword for iOS 18

Apple breaks the rules and fixes DarkSword for iOS 18

Apple has fixed the security holes that the DarkSword exploit chain took advantage of for all affected users, even those who haven't yet upgraded to iOS.

Top 5 this week

Page 12 of 210