Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
LinkedIn Browser Fingerprinting: Extension Scanning, Privacy Risks, and Security Claims
LinkedIn, the professional networking platform owned by Microsoft, has become the focus of a growing privacy debate after the German ...
Anthropic’s Project Glasswing: How Claude Mythos Changes Cybersecurity Risk
Anthropic has unveiled Project Glasswing, an initiative that deploys its new frontier AI model Claude Mythos to hunt and remediate ...
North Korean “Contagious Interview” Campaign Targets Go, Rust and PHP in Software Supply Chain Attacks
North Korean threat actors have significantly expanded the “Contagious Interview” software supply chain campaign, placing malicious packages across multiple open-source ...
ComfyUI Botnet Exploits Exposed Stable Diffusion Servers for Cryptomining and Proxy Abuse
A large-scale botnet campaign is actively compromising publicly accessible ComfyUI instances – a popular web interface for the Stable Diffusion ...
Dark Applications and AI Agents: Closing the Identity Confidence Gap in Zero Trust Programs
By 2026, many enterprises report mature identity and access management (IAM) and Zero Trust security programs on paper, yet their ...
Axios npm Compromise Exposes Coordinated Supply Chain Attacks on Node.js Maintainers
The recent Axios npm compromise has turned out not to be an isolated incident but part of a coordinated software ...
GPU RowHammer Attacks: GPUBreach, GDDRHammer and GeForge Threaten Cloud AI Security
Recent academic research has shown that modern high‑performance graphics processing units (GPUs) are vulnerable to a new class of RowHammer ...
Hasbro Cyber Attack: Analysis of the 2025 Security Incident and Supply Chain Risks
Global toy and entertainment giant Hasbro has reported a significant cybersecurity incident that could disrupt parts of its operations for ...
Storm-1175 Uses Zero-Day Vulnerabilities to Deliver Medusa Ransomware in Rapid Attacks
A China-based cybercriminal group tracked by Microsoft Threat Intelligence as Storm-1175 is conducting highly automated, high-speed attacks against internet-facing systems ...
Flowise Vulnerability CVE-2025-59528: Critical RCE Threat to AI Infrastructure
The open‑source AI orchestration platform Flowise has been hit by a critical security vulnerability, tracked as CVE-2025-59528 with the maximum ...