We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
Published 2 hours ago
-
Automated Credential Harvesting Campaign Exploits React2Shell Flaw
Published 2 hours ago
-
Shadow AI in Healthcare is Here to Stay
Published 4 hours ago
-
OWASP GenAI Security Project Gets Update, New Tools Matrix
Published 4 hours ago
-
Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps
Published 5 hours ago
-
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More
Published 5 hours ago
-
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
Published 6 hours ago
-
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Published 8 hours ago
-
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
Published 11 hours ago
-
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
Published 1 day ago
-
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Published 1 day ago
-
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Published 1 day ago
-
Inconsistent Privacy Labels Don't Tell Users What They Are Getting
Published 2 days ago
-
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
Published 3 days ago
-
Apple Breaks Precedent, Patches DarkSword for iOS 18
Published 3 days ago
-
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Published 3 days ago
-
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
Published 3 days ago
-
Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
Published 3 days ago
-
Source Code Leaks Highlight Lack of Supply Chain Oversight
Published 3 days ago
-
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
Published 3 days ago
-
CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry
Published 3 days ago
-
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Published 3 days ago
-
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
Published 3 days ago
-
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Published 3 days ago
-
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
Published 3 days ago