Cyber Security

PCPJack Credential Stealer Exploits 5 CVEs to Spread Wo...

Cybersecurity researchers have disclosed details of a new credential theft frame...

Has CISA Finally Found Its New Leader in Tom Parker?

Dark Reading investigates rumors that Tom Parker, a board room 'operator' and lo...

'TrustFall' Convention Exposes Claude Code Execution Risk

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Ge...

World's First AI-Driven Cyberattack Couldn't Breach OT ...

The most sophisticated AI-integrated campaign to date hit a brick wall in the fo...

One Click, Total Shutdown: The "Patient Zero" Webinar o...

The hardest part of cybersecurity isn't the technology, it’s the people. Every m...

PAN-OS RCE Exploit Under Active Use Enabling Root Acces...

Palo Alto Networks has disclosed that threat actors may have attempted to unsucc...

ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Da...

Bad week. Turns out the easiest way to get hacked in 2026 is still the same old ...

Day Zero Readiness: The Operational Gaps That Break Inc...

Having an incident response retainer, or even a pre-approved external incident r...

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs ...

Cybersecurity researchers have discovered three packages on the Python Package I...

Attackers compromised Daemon Tools software to deliver ...

Kaspersky researchers uncovered another supply chain compromise involving a popu...

Sysdig delivers cloud security that runs inside AI codi...

Sysdig announced headless cloud security, a cyberdefense platform designed for t...

Teams calls are about to get a lot harder to fake

Microsoft Teams Calling is getting a new feature that will warn users about susp...

Multi-model AI is creating a routing headache for enter...

Application teams are moving AI inference into production systems that support b...

Open-source MCP server monitoring for Python apps

Pythonic Model Context Protocol servers handle tool calls, session events, modul...

vm2 Node.js Library Vulnerabilities Enable Sandbox Esca...

A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js...

Instructure Breach Exposes Schools' Vendor Dependence

ShinyHunters' attack on Instructure, which owns the widely used Canvas learning ...