Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes ...
One-in-four (24%) healthcare organizations (HCOs) experienced cyber-attacks impacting medical devices over the past year, ...
The threat landscape in 2025 was characterized by a surge in compromised credentials, extortion and vulnerability ...
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
Agentic AI sees organizations moving from managing system risk to managing decision risk, and that is a far more complex ...
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the ...