Critical vulnerabilities doubled year-over-year, signaling rising risk severity as AI-driven discovery and expanding attack ...
DeFi faced its worst month with a $292M hack linked to North Korea's Lazarus Group. Another $100M+ crypto hack by year-end at ...
The public sector is the most attractive target for cybercriminals according to Kaspersky's Anatomy of a Cyber World: Global ...
Private key compromises are emerging as one of crypto’s costliest attack vectors, with hackers stealing more than $17 billion ...
Explores Zero Trust, SBOM, and practical steps to secure the software supply chain, boost resilience, and communicate risk to leadership.
Backed by Sonatype's industry-leading security research team, Sonatype Repository Firewall helped customers prevent 136,107 open source malware attacks in Q1. To explore the full findings from the Q1 ...
Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation ...
Popular tool abuse, ClickFix, and identity-based attacks are among the most prevalent techniques bad actors are deploying ...
University of California researchers have identified a new class crypto theft, stemming from AI agent routers - here's everything to know.
Email subscription bombing (also known as subscription flooding or email spam bombing) is an attack technique that overwhelms ...
Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ...
Rhea Finance lost $7.6M in an oracle manipulation exploit. Attackers used fake tokens and fresh liquidity pools to mislead ...
一部の結果でアクセス不可の可能性があるため、非表示になっています。
アクセス不可の結果を表示する