PHANTOMPULSE spreads via Obsidian plugin abuse in REF6598 campaign, targeting finance and crypto users, bypassing AV controls ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
University of California researchers have identified a new class crypto theft, stemming from AI agent routers - here's everything to know.
Suspected North Korean hackers have compromised Axios, one of the most widely used JavaScript libraries in American software development, by hijacking a maintainer’s npm account and publishing tainted ...
Fairlight Live is a software-based live audio mixer that supports SMPTE-2110 broadcast workflows and spatial audio mixing.
DaVinci Resolve adds a Photo page, new AI search, speech generation, Fusion graphics, and Fairlight track folders in version ...
A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix ...
The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North ...
The design flaw in Flowise’s Custom MCP node has allowed attackers to execute arbitrary JavaScript through unvalidated ...
SunFounder has sent us a sample of the Pironman 5 Pro Max tower PC case for Raspberry Pi 5 for review alongside a PiPower 5 ...