AI chatbots make it possible for people who can’t code to build apps, sites and tools. But it’s decidedly problematic.
Shadow AI 2.0 isn’t a hypothetical future, it’s a predictable consequence of fast hardware, easy distribution, and developer ...
UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
TeamPCP strikes again, with almost identical code to LiteLLM.
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.
Among the wildest revelations in Claude Code's recent leak is that the AI coding tool is scouring user inputs for signs of ...
LinkedIn is facing two lawsuits over its practice of scanning users’ browsers to determine which extensions they’re running.
CERT-EU attributed a 92 GB data breach at the European Commission to TeamPCP, which compromised the Trivy security scanner in ...
PM This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.