Hírek

State-backed hackers breached Southeast Asia telecoms using advanced tools—no data stolen, but stealth access achieved.
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
Akira ransomware exploits SonicWall SSL VPNs, hitting patched devices. Organizations face risks from possible zero-day flaw.
The solution lies in fundamentally reimagining security data architecture around what AI models actually need to perform ...
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...
The ongoing campaign, first detected in early 2025, is designed to use the OAuth applications as a gateway to obtain ...
Critical flaw in Cursor AI editor let attackers execute remote code via Slack and GitHub—fixed in v1.3 update.
SentinelOne boosts enterprise cyber defense with AI-powered endpoint security, cutting response time and risk across ...
In the npm ecosystem, postinstall scripts are often overlooked attack vectors—they run automatically after a package is ...
Pillar Security unveils full-lifecycle AI platform securing assets from design to runtime—critical for safe AI deployment.
Vendetect - It is an open-source tool designed to detect copied or vendored code across repositories — even when the code has ...
Threat actors abuse Proofpoint and Intermedia link wrapping to deliver phishing emails and steal Microsoft 365 credentials.