North Korea-Nexus Threat Actor Compromised popular NPM package Axios with over 100 million weekly downloads A financially motivated North Korean hacking group compromised an NPM package Axios, with ...
The leak of the source code behind Claude Code handed developers and security researchers a rare window into the architecture of a high-profile AI product In a significant setback, Anthropic’s ...
European Commission faced a cyberattack on March 24 targeting the cloud infrastructure hosting the Commission's web presence on the Europa.eu platform European Commission suffered a cyberattack ...
Iranian hacktivist group Handala Hack published over 300 personal emails and pictures belonging to Kash Patel after the FBI ceased Handala-linked domains “Today, once again, the world witnessed the ...
IBM's Sebastian Weir takes a deep dive into what AI brings to the cyber table for the finance sector in terms of both defence and offence Backed by AI, cybercriminals are mounting industrial scale ...
CyberMagazine takes a look at the top stories of this week, featuring CrowdStrike, NVIDIA, N-able and Comcast among others When pro-Iranian threat actors struck US medical giant Stryker last week, it ...
NETSCOUT’s CTO for Security, Darren Anstee explores why deep visibility and data quality matters now, when AI and automation are amplifying cyber threats At this year’s MWC in Barcelona, talk of 5G, ...
Cybersecurity tool Trivy was compromised by TeamPCP attackers who harvested credentials, planted persistent backdoors and a self-propagating worm On 19 March 2026, a major cybersecurity incident ...
Jasjyot Singh OBE, CEO of Consumer Relationships at Lloyds Bank A software glitch at Lloyds Banking Group exposed the transactions, account details and sensitive data to other users, as company offers ...
CrowdStrike partners with Nebius, bringing Falcon protection to Nebius AI Cloud, bringing unified enterprise-grade cybersecurity to securely scale AI AI, positioned as a gamechanger in technology, is ...
A data leak at Meta was caused by an AI agent acting without permission, which exposed sensitive data for hours, cementing the need for agentic security Meta recently experienced exactly that scenario ...
N-able's State of the SOC Report finds attackers are revisiting older tactics, with network and perimeter-based attacks making a strong comeback When one door locks, attackers try the window. Ever ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results