Dec 06, 2025Ravie LakshmananAI Security / Vulnerability Over 30 security vulnerabilities have been disclosed…
tools
-
-
Researchers at Palo Alto Networks’ Unit 42 are tracking two new malicious AI tools,…
-
Dec 02, 2025Ravie LakshmananMalware / Blockchain The supply chain campaign known as GlassWorm has…
-
Dec 02, 2025Ravie LakshmananAI Security / Software Supply Chain Cybersecurity researchers have disclosed details…
-
A large phishing campaign is using phony seasonal party invites to trick users into…
-
While tracking the activities of the Tomiris threat actor, we identified new malicious operations…
-
Network SecuritySecurity
CSPM buyer’s guide: How to choose the best cloud security posture management tools
CSPM tools look at workloads to see what’s happening and they provide context, so…
-
The rapid evolution of malicious AI tools has entered a new and dangerous phase…
-
Platforms that developers use to format their input unintentionally share “thousands” of secrets, according…
-
Nov 25, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as ToddyCat has been…
