Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude ...
LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of ...
OpenAI announced they are extending the Responses API to make it easier for developer to build agentic workflows, adding ...
Cloudflare says dynamically loaded Workers are priced at $0.002 per unique Worker loaded per day, in addition to standard CPU ...
On March 19, 2026, a threat actor known as TeamPCP compromised Aqua Security’s Trivy vulnerability scanner – the most widely adopted open-source scanner in the cloud-native ecosystem. The attacker ...
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
North Korean hackers exploit VS Code tasks.json auto-run since Dec 2025 to deploy StoatWaffle malware, stealing data and ...
The primary condition for use is the technical readiness of an organization’s hardware and sandbox environment.