Security
Log4Shell Revisited: How a Single Vulnerability Reshaped Software Supply Chain Security
8/9/2025
Security
Critical Vulnerability Discovered in XZ Utils, Threatening Linux Systems Worldwide
8/7/2025
Security
Supply Chain Sabotage: Malicious Scripts Exploit jsdelivr in Credential Harvesting Scheme
8/7/2025

Security
Air France-KLM Breach Exposes Third-Party Risks in Aviation Cybersecurity
8/7/2025
Security
Critical Vulnerability in Popular Image Tool Exposes Systems to Remote Code Execution
8/5/2025

Security
Cisco Confirms Vishing Attack Led to Theft of Cisco.com User Profiles
8/5/2025

Dev
State Actors Target Open Source: The Hidden Contributor Threat Exposed
8/4/2025

Security
Mozilla Alerts Developers to Sophisticated Phishing Campaign Targeting AMO Accounts
8/4/2025

Security
Microsoft Breaks Risky Excel Links: New Security Move Blocks External Workbook Threats
7/31/2025

Security
Russian FSB Hackers Exploit ISP Access to Target Embassies in Unprecedented AiTM Campaign
7/31/2025

Security
Turla's ISP Gambit: How Russia's Elite Hackers Weaponize Infrastructure for Diplomatic Espionage
7/31/2025

Security
Fake PyPI Site Targets Python Developers in Credential Phishing Campaign
7/30/2025

Security
Critical RCE Vulnerability in WordPress Alone Theme Exploited in Over 120,000 Attacks
7/30/2025