LATEST

Claude Source Code Leak Highlights Big Supply Chain Missteps

Claude Source Code Leak Highlights Big Supply Chain Missteps

More than half a million lines of source code for Anthropic's Claude Code package were made public by mistake This article explores attack software.

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CYBER ATTACKZerowl

The U.S This article explores state cyberattacks cisa. . Cybersecurity and Infrastructure Security Agency (CISA) has added a serious security hole.

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Since the middle of 2025, a cyber actor backed by China has been going after European government and diplomatic groups This article explores diplomatic.

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard launched Factory 2.0, a new version of its tool for handling hardened open-source images and secure software artifacts, components, and images.

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

The European Commission and Mercor have both made public reports about TeamPCP violations This article explores teampcp using stolen. . Threat actors are.

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

CYBER ATTACKZerowl

Researchers found a serious supply chain attack on Axios, a popular HTTP client for JavaScript that gets over 70 million downloads a week This article.

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

CYBER ATTACKZerowl

On March 31, 2026, two versions of the popular JavaScript HTTP library Axios were briefly uploaded to npm This article explores broken versions axios.

Apple breaks the rules and fixes DarkSword for iOS 18

Apple breaks the rules and fixes DarkSword for iOS 18

Apple has fixed the security holes that the DarkSword exploit chain took advantage of for all affected users, even those who haven't yet upgraded to iOS.

AI is making SOC teams rethink how fast and big they can go.

AI is making SOC teams rethink how fast and big they can go.

Cyberattacks are happening at record speeds thanks to artificial intelligence This article explores ai based socs. . Attackers are using AI to make their.

Visibility Is the First Step to Securing Shadow AI

Visibility Is the First Step to Securing Shadow AI

DATA BREACHZerowl

Most security teams can't keep up with how quickly AI is being used This article explores ai agents treated. . Max Imbiel says that companies can use the.

Top 5 this week

Page 13 of 211