Socket uncovers large-scale GitHub spam campaign abusing “Discussions” notifications Fake advisories with bogus CVEs trick ...
AI agents can provide enormous benefits, but they can also behave a lot like malware, acting autonomously and causing harm if ...
He also foresaw that the global victory of American-style capitalism in the Cold War was not the “end of history,” but contained the seeds of a coming global crisis, notably in the form of worsening ...
A newly documented BlankGrabber infection chain is using a bogus “certificate” loader to disguise a multi-stage Windows compromise, adding another layer of deception to a commodity stealer already ...
A newly discovered attack sandbags Apple users into hacking themselves. Here’s what all Mac users need to know.
A 12th-grade student in Thanh Hoa Province has been accused of developing malicious software and selling it to cybercrime ...
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...
On the morning of March 24, 2026, tens of thousands of software developers working on AI applications were unknowingly exposed to malware.
After hacking Trivy, TeamPCP moved to compromise repositories across NPM, Docker Hub, VS Code, and PyPI, stealing over 300GB ...
LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of ...
The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
Two versions of LiteLLM, an open source interface for accessing multiple large language models, have been removed from the ...