The TeamPCP hackers behind the Trivy supply-chain attack continued to target Aqua Security, pushing malicious Docker images ...
A threat actor used the open source security tool to breach CI/CD workflows and steal cloud credentials, SSH keys, and other ...
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm ...
Is the "S" in MCP missing? Explore the current state of Model Context Protocol security, from stdio vs. HTTP transport risks ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
Passing MFA doesn't mean a session is safe, attackers can hijack tokens and bypass identity checks. Specops Software explains ...
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across ...
Shadow AI hidden in SaaS apps is driving a surge in cyberattacks, with OAuth token abuse and agentic AI enabling cascading ...
Token, the biometric identity assurance company, today announced the TokenCore Node at RSA Conference 2026 -- a compact biometric authenticator designed for organizations that req ...
SaaS or AI ecosystems in 2025 despite running an average of 13 security tools. The architecture wasn't built for AI agents.
This new Claude Code Review tool uses AI agents to check your pull requests for bugs - here's how ...