Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than…
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than…
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from…
Advanced fraud attacks surged 180% in 2025 as cyber-scammers used generative AI to churn out flawless IDs, deepfakes, and autonomous…
As in the wider world, AI is not quite living up to the hype in the cyber underground. But it’s…
It’s the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt…
Cyberattackers are integrating large language models (LLMs) into the malware, running prompts at runtime to evade detection and augment their…
More than half of organizations surveyed aren’t sure they can secure non-human identities (NHIs), underscoring the lag between the rollout…
South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led…
India’s Digital Personal Data Protection (DPDP) Act represents a significant regulatory shift that affects every Data Fiduciary handling the personal…
Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the…