We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
Published 1 hour ago
-
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
Published 13 hours ago
-
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
Published 14 hours ago
-
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
Published 15 hours ago
-
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
Published 18 hours ago
-
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
Published 20 hours ago
-
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
Published 22 hours ago
-
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
Published 23 hours ago
-
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
Published 1 day ago
-
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
Published 1 day ago
-
Claude Mythos Fears Startle Japan's Financial Services Sector
Published 1 day ago
-
Reverse Engineering With AI Unearths High-Severity GitHub Bug
Published 1 day ago
-
AI Finds 38 Security Flaws in Electronic Health Record Platform
Published 1 day ago
-
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
Published 1 day ago
-
SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware
Published 1 day ago
-
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
Published 1 day ago
-
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
Published 1 day ago
-
Lotus Wiper Attack Targeted Venezuelan Energy Firms, Utilities
Published 1 day ago
-
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
Published 1 day ago
-
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
Published 1 day ago
-
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
Published 2 days ago
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Published 2 days ago
-
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
Published 2 days ago
-
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
Published 2 days ago
-
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
Published 2 days ago