News

An urgent warning has been issued to Android users that millions of devices have been infected with the 'BadBox malware' ...
Identity and Access Control: Services like AWS Identity and Access Management (IAM) enable granular permission setting for cloud resources and APIs. This includes establishing password policies, ...
A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for ...
The incident highlights rising AI risks as malicious actors exploit powerful tools amid weak safeguards and oversight.
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ...
It has been a busy week for supply-chain attacks targeting open source software available in public repositories, with ...
Hackers compromised Toptal's GitHub organization account and used their access to publish ten malicious packages on the Node ...
Hackers are now using AI to scale attacks, exploit vulnerabilities more quickly and create deceptive content that’s nearly ...
Elon Musk's X is launching a pilot test to use its fact-checking system, Community Notes, to identify and highlight popular ...
Two malware campaigns, Soco404 and Koske, target cloud services with cryptominers via images and misconfigurations.
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
The Linux malware campaign leverages AI-generated code and weaponized panda JPEGs to deploy stealthy and persistent ...