Backdoored PyTorch Lightning Package Drops Credential Stealer The PyTorch Lightning package, a popular deep learning framework, was recently found to contain a malicious version on the...
Educational Giant Instructure Confirms Data Breach Recently, Instructure, a prominent U.S.-based education technology company renowned for its Canvas learning management system, fell victim to a cyberattack....
Anthropic, the creators of the Model Context Protocol (MCP), established this open standard as a means for AI agents to communicate with tools. The industry giants...
Deployment surface mismatch CVP is designed for authorized offensive security research, not prompt injection defense. It does not extend to Bedrock, Vertex, or ZDR tenants. TAC...
Vercel, a popular cloud platform known for Next.js and its extensive npm downloads, recently faced a security incident where unauthorized access was gained to their internal...
Mazda Security Breach Exposes Employee and Partner Data Recently, Mazda Motor Corporation (Mazda) revealed a security breach that compromised the personal information of its employees and...
Ransomware Group Velvet Tempest Deploys DonutLoader and CastleRAT In the realm of cybersecurity, threat actors known as Velvet Tempest have been making waves with their use...
Welcome to Our Blog Home About Us Contact Latest Blog Post Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore...
Japanese Cybersecurity Firm, Trend Micro, Addresses Critical Apex One Vulnerabilities Japanese cybersecurity software firm Trend Micro recently released patches for two critical vulnerabilities in its Apex...
A well-coordinated campaign has been launched to target software developers using job-themed bait, which involves malicious repositories posing as legitimate Next.js projects and technical assessment materials,...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.