LATEST

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

The European Commission and Mercor have both made public reports about TeamPCP violations This article explores teampcp using stolen. . Threat actors are.

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

CYBER ATTACKZerowl

Researchers found a serious supply chain attack on Axios, a popular HTTP client for JavaScript that gets over 70 million downloads a week This article.

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

CYBER ATTACKZerowl

On March 31, 2026, two versions of the popular JavaScript HTTP library Axios were briefly uploaded to npm This article explores broken versions axios.

Apple breaks the rules and fixes DarkSword for iOS 18

Apple breaks the rules and fixes DarkSword for iOS 18

Apple has fixed the security holes that the DarkSword exploit chain took advantage of for all affected users, even those who haven't yet upgraded to iOS.

AI is making SOC teams rethink how fast and big they can go.

AI is making SOC teams rethink how fast and big they can go.

Cyberattacks are happening at record speeds thanks to artificial intelligence This article explores ai based socs. . Attackers are using AI to make their.

Visibility Is the First Step to Securing Shadow AI

Visibility Is the First Step to Securing Shadow AI

DATA BREACHZerowl

Most security teams can't keep up with how quickly AI is being used This article explores ai agents treated. . Max Imbiel says that companies can use the.

Security Bosses Are All-In on AI. Here's Why

Security Bosses Are All-In on AI. Here's Why

This is part of our ongoing series about what we learned about AI, cybersecurity, and geopolitics at RSAC 2026. We're concentrating on machine learning.

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

Hasbro, the company that makes toys and games, recently had a cybersecurity breach, but they said they would still take orders and ship products, even if.

North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks

North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks

CYBER ATTACKZerowl

A new campaign that is going after South Korea is using Windows shortcut files, or LNK files, to send targeted phishing emails through GitHub This article.

New Chrome Zero-Day Vulnerability Under Active Exploitation – Patch Now

New Chrome Zero-Day Vulnerability Under Active Exploitation – Patch Now

CYBER ATTACKZerowl

Google has put out an urgent security update for its Chrome desktop browser to fix 21 security holes This article explores security update chrome. . The.

Top 5 this week

Page 5 of 202