Cyber Security

Vercel breached via compromised third-party AI tool

Cloud deployment and hosting platform Vercel has suffered a security breach that...

WhatsApp Leaks User Metadata to Attackers

Strangers can infer limited info about you without knowing or messaging you, whi...

⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, ...

Monday’s recap shows the same pattern in different places. A third-party tool be...

Coast Guard's New Cybersecurity Rules Offer Lessons for...

The Maritime Transportation Security Act (MTSA) requires plans to protect OT sys...

Why Most AI Deployments Stall After the Demo

The fastest way to fall in love with an AI tool is to watch the demo. Everything...

Anthropic MCP Design Vulnerability Enables RCE, Threate...

Cybersecurity researchers have discovered a critical "by design" weakness in the...

Researchers Detect ZionSiphon Malware Targeting Israeli...

Cybersecurity researchers have flagged a new malware called ZionSiphon that appe...

Vercel Breach Tied to Context AI Hack Exposes Limited C...

Web infrastructure provider Vercel has disclosed a security breach that allows b...

Week in review: Acrobat Reader flaw exploited, Claude M...

Here’s an overview of some of last week’s most interesting news, articles, inter...

[Webinar] Eliminate Ghost Identities Before They Expose...

In 2024, compromised service accounts and forgotten API keys were behind 68% of ...

$13.74M Hack Shuts Down Sanctioned Grinex Exchange Afte...

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K....

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijac...

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-...

Codex can now operate between apps. Where are the bound...

OpenAI is rolling out a major update to the Codex desktop app for users signed i...

How NIST's Cutback of CVE Handling Impacts Cyber Teams

Industry and ad hoc coalitions appear poised to help fill the gap created by NIS...

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

In embracing device code phishing, attackers trick victims into handing over acc...

Every Old Vulnerability Is Now an AI Vulnerability

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.