ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
A North Korean APT has crafted malicious software packages to appeal to AI coding agents, while ‘slopsquatting’ shows the ...
There may be no “defender’s dividend”, in which AI itself helps forestall the danger. Software can be fixed quickly, but ...
Supply chain theft is no longer just criminal groups operating locally, but transnational cybercriminal syndicates exploiting ...
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of ...
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting ...
The new kit aims to address risks related to poisoned models, regulatory issues, supply chain integrity, and incident ...
A single line of Python code was all it took. Developers who ran import lightning after installing versions 2.6.2 or 2.6.3 of ...
A malicious npm dependency slipped into an AI-assisted crypto trading project has exposed how automated coding tools can be manipulated into importing software that steals credentials, wallet data and ...