We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks
Published 1 hour ago
-
Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware
Published 2 hours ago
-
Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software
Published 6 hours ago
-
Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer
Published 8 hours ago
-
LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root
Published 10 hours ago
-
Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV
Published 10 hours ago
-
First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups
Published 1 day ago
-
Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware
Published 1 day ago
-
Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers
Published 1 day ago
-
Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks
Published 1 day ago
-
Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows
Published 1 day ago
-
Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective
Published 1 day ago
-
Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks
Published 1 day ago
-
China's Webworm Uses Discord, Microsoft Graphs to Hack EU Govts.
Published 1 day ago
-
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Published 1 day ago
-
Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access
Published 1 day ago
-
How CISOs Should Prep for Agentic-Ready AI BOMs
Published 1 day ago
-
Google API Keys Remain Active After Deletion
Published 1 day ago
-
AI Agents Are Shifting Identity Security Budget Dynamics
Published 2 days ago
-
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
Published 2 days ago
-
Chinese APTs Share Linux Backdoor in Central Asia Telco Attacks
Published 2 days ago
-
Content Delivery Exploit Opens Websites to Brand Hijacking
Published 2 days ago
-
ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories
Published 2 days ago
-
Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
Published 2 days ago
-
When Identity is the Attack Path
Published 2 days ago