GlassWorm uses Zig binary to infect multiple IDEs
A stealthy new iteration of the GlassWorm campaign is infiltrating developer environments by weaponizing a counterfeit Visual Studio Code extension that depl...
Aggregating 4487 articles from trusted cybersecurity sources
A stealthy new iteration of the GlassWorm campaign is infiltrating developer environments by weaponizing a counterfeit Visual Studio Code extension that depl...
A sprawling advertising-based surveillance apparatus known as Webloc, capable of tracking the historical movements of up to half a billion mobile devices, ha...
A new LexisNexis Risk Solutions analysis warns that synthetic identity fraud has surged to become the fastest-growing fraud category globally, now constituti...
New research from Experian reveals a striking paradox in Australia's digital economy: while nine out of ten consumers express deep anxiety over identity thef...
A new SANS Institute survey exposes a dangerous asymmetry between the explosive proliferation of non-human identities and the outdated governance mechanisms ...
The cyberattack targeted the hydraulic pump system protecting Piazza San Marco.
The attacker manipulated the AI platforms by initially posing as part of a bug bounty program and providing a hacking manual to bypass safety filters.
The operation centered around the W3LL phishing kit, a tool sold for approximately $500 that enabled cybercriminals to create convincing fake login pages for...
The Infoblox report, in collaboration with Chong Lua Dao, reveals how individuals trafficked into scam centers are exploited to support a malware distributio...
In a Texas court case in April 2026, the FBI presented evidence of recovered Signal messages from criminal defendant Lynette Sharp's iPhone, despite her havi...
An investigation by Bellingcat uncovered close to 800 Hungarian government email and password combinations in breach dumps, impacting ministries from defense...
The company said a developer tool automatically retrieved a malicious version of the popular open-source library, but insists the integrity of its systems an...
Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid. [.
Security Affairs reports that prolific Russian dark web forum and ransomware network RAMP has suffered a major data leak that exposed thousands of user recor...
TechCrunch reports that Vercel has disclosed that unencrypted customer information had been compromised prior to this month's breach that affected its intern...
Article 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a brea...
UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed
Bitwarden CLI was hit by the Checkmarx supply chain attack. Version 2026.
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
A newly identified cyber threat group, UNC6692, is using a clever mix of social engineering and custom malware to infiltrate corporate networks. By impersona...
Cybersecurity researchers at Socket have uncovered a major supply chain compromise affecting the Bitwarden CLI. Attackers successfully abused a GitHub Action...
Rituals disclosed a breach where hackers accessed and downloaded some My Rituals members’ data, including names and addresses. Luxury cosmetics giant Rituals...
Hackers have compromised Docker images, VSCode and Open VSX extensions for the Checkmarx KICS analysis tool to harvest sensitive data from developer environm...
California-based marijuana delivery service Three Trees had data from at least 40,000 individuals leaked as a result of a misconfigured MongoDB database, Cyb...