Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
Notepad++ Boosts Auto-Update Security with Double-Lock Mechanism After Supply Chain Attack
The popular text editor Notepad++ has significantly reinforced its auto-update infrastructure by introducing a new “double-lock” update verification mechanism. This ...
Critical VS Code Extension Vulnerabilities Put Software Supply Chains at Risk
Popular Visual Studio Code extensions with more than 125 million installs have been found vulnerable to attacks that enable local ...
Anthropic Accuses Chinese AI Firms of Large-Scale Claude Model Distillation
Anthropic has reported what it describes as a large-scale model distillation campaign targeting its Claude large language model (LLM), allegedly ...
Texas Sues TP-Link Over Router Security Flaws, Firmware Vulnerabilities, and Supply-Chain Risks
The Office of the Attorney General of Texas has filed a lawsuit against network equipment manufacturer TP-Link, accusing the company ...
Anthropic Unveils Claude Code Security: AI-Powered Vulnerability Detection for DevSecOps
Anthropic has announced Claude Code Security, a new AI-driven capability designed to detect vulnerabilities in source code and propose fixes. ...
LLM-Powered Campaign Compromises Over 600 FortiGate Firewalls Worldwide
Amazon security specialists have disclosed a large-scale, targeted campaign against FortiGate firewalls in which a Russian-speaking threat actor compromised more ...
BeyondTrust CVE‑2026‑1731 Actively Exploited: CISA KEV Expansion and a Stealth Supply Chain Attack on Notepad++
Attackers are aggressively exploiting the critical vulnerability CVE‑2026‑1731 in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA), prompting the ...
North Korean Hackers Weaponize Google Gemini in Advanced AI-Driven Cyber Operations
Generative AI is rapidly shifting from a productivity tool to a powerful asset in the hands of cybercriminals. According to ...
Advanced Supply Chain Attacks on npm and PyPI: Lazarus‑Linked graphalgo Campaign and New Malware Waves
Open source ecosystems npm and PyPI have again become high‑value targets in a coordinated software supply chain attack. Cybersecurity researchers ...
Continuous Threat Exposure Management (CTEM): The New Divide in Enterprise Cybersecurity
A recent 2026 market study of 128 senior security decision‑makers reveals a clear split between enterprises that have adopted Continuous ...