We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
Published 2 hours ago
-
Android Adds Intrusion Logging for Sophisticated Spyware Forensics
Published 3 hours ago
-
It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
Published 13 hours ago
-
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
Published 17 hours ago
-
RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
Published 19 hours ago
-
Hugging Face Packages Weaponized With a Single File Tweak
Published 20 hours ago
-
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
Published 21 hours ago
-
Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
Published 22 hours ago
-
Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain
Published 23 hours ago
-
Why Agentic AI Is Security's Next Blind Spot
Published 23 hours ago
-
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
Published 1 day ago
-
Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
Published 1 day ago
-
OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
Published 1 day ago
-
iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android
Published 1 day ago
-
FCC Softens Ban on Foreign-Made Routers
Published 1 day ago
-
Tech Can't Stop These Threats — Your People Can
Published 1 day ago
-
20 Leaders Who Built the CISO Era: 2 Decades of Change
Published 1 day ago
-
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
Published 1 day ago
-
cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor
Published 1 day ago
-
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
Published 1 day ago
-
'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
Published 1 day ago
-
Hackers Use AI for Exploit Development, Attack Automation
Published 1 day ago
-
⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More
Published 1 day ago
-
Cyber Espionage Group Targets Aviation Firms to Steal Map Data
Published 1 day ago
-
Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room
Published 1 day ago