Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week

An attack targeting the Node.js ecosystem was just identified — but not before it compromised 18 npm packages that account for billions of weekly downloads. Read more »

Go-to Resources for Secure Cloud Storage

The cloud is becoming the norm when it comes to data storage, but it’s not without its challenges. The right policies and procedures can go a long way toward... Read more »

Cybercriminals ‘Grok’ Their Way Past X’s Defenses to Spread Malware

Hackers exploit X’s Grok AI to spread malware via promoted ads, exposing millions to malicious links in a scheme researchers call “Grokking.” Read more »

Build Practical Cyber Defense Skills with This 5-Course Bundle

Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just $19.99. Read more »

Is a Recent Windows Update Responsible for SSD Failures? Microsoft Has an Answer

A rash of SSD failures have prompted some users to blame a recent Windows Update. Microsoft insist the problem is not its fault. Read more »

‘Unprecedented Growth’ by Anthropic: This AI Startup is Now Valued at $183B

Claude AI creator Anthropic plans to use the money from its latest funding round for enterprise products, safety research and expanding internationally. Read more »

Google Says Claims of Mass Gmail Security Breach Are “Entirely False”

Google has debunked the recent reports that it was alerting its billions of Gmail users to a security breach. Read more »

Apple Contends UK’s ‘EU-Style’ Antitrust Regulations Harm Users and Developers

In a statement to TechRepublic, Apple also says the UK regulations threaten the security of its products. Read more »

Anthropic Warns of AI-Powered Cybercrime in New Threat Report

Anthropic’s August report reveals hackers, North Korean operatives, and state actors misused its Claude AI for extortion, fraud, and espionage. Read more »

Salt Typhoon Cyber Spies Breached 80+ Nations, FBI Warns

Salt Typhoon hackers bypassed smash-and-grab tactics, infiltrating routers and surveillance systems to steal sensitive data and evade detection. Read more »
Subscribe to our Newsletter