- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: AI Security
Summary Points Cybercriminals are exploiting npm and PyPI packages using compromised developer tokens and malicious…
Essential Insights North Korean threat actors are increasingly using compromised developer repositories in the software…
Fast Facts Ransomware remains dominant with 702 incidents in March, driven by sophisticated groups like…
Summary Points Exploiting vulnerabilities in Lantronix and Silex serial-to-IP converters can allow attackers to hijack…
Essential Insights The new open-source MCP Server enhances security teams’ ability to rapidly interrogate vulnerability…
Quick Takeaways Threat actors are disguising malware within true .wav files by replacing audio bytes…
Essential Insights A critical flaw in the Model Context Protocol’s (MCP) architecture allows remote code…
Quick Takeaways Over 702 ransomware attacks targeted critical sectors globally, with top groups operating at…
Top Highlights Over 110 new CVEs are published daily in 2024, with only 5-7% exploited…
Quick Takeaways Cyber attackers exploited a compromised third-party AI tool and an employee’s Google Workspace…