Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
In the wake of Claude Code's source code leak, 5 actions enterprise security leaders should take now
Gartner issued a same-day advisory after Anthropic leaked Claude Code's full architecture. CrowdStrike CTO Elia Zaitsev and ...
Sigrid Jin woke up to chaos and shipped "Claw Code" by breakfast. Here's everything it taught the world.
The cybercrime crew linked to the Trivy supply-chain attack has struck again, this time pushing malicious Telnyx package ...
Threats actors pounced on the vulnerability within hours of its disclosure, demonstrating that organizations have little time ...
Advanced iOS exploits are scalable and actively circulating. A new report detailing "DarkSword" found its highly sophisticated mobile exploitation capabilities are being used across multiple threat ...
Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability within 20 hours, working only from the advisory description. The bug, CVE-2026 ...
The big picture: A cybercriminal is reportedly selling a Windows zero-day exploit on the dark web for $220,000. The vulnerability, which targets Windows Remote Desktop Services, could allow an ...
Forbes contributors publish independent expert analyses and insights. Tony Bradley covers the intersection of tech and entertainment. The cybersecurity threat landscape is shifting as adversaries ...
Google Threat Intelligence Group warns enterprise systems increasingly targeted by zero-day exploits
A new report out today from Google LLC’s Threat Intelligence Group finds that zero-day vulnerability exploitation remained elevated in 2025 as attackers increasingly targeted enterprise infrastructure ...
What we know so far: A powerful iOS exploit framework that once appeared to sit in the orbit of government surveillance work is now being reused in criminal schemes to drain cryptocurrency wallets and ...
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results