Latest News

Threats

Crypto Drainers: How They Work

Crypto drainers are tools designed to steal cryptocurrency assets by abusing wallet permissions and transaction approvals, often through social engineering tactics.

🐛 Vulnerabilities

Open-Source Vulnerabilities Concern CISA Chief

CISA acting director Nick Andersen warns of the risks posed by open-source vulnerabilities and the need for urgent security improvements to prevent widespread attacks.

Threats

Tech Support Scam Assistants Plead Guilty

Two Americans, Adam Young and Harrison Gevirtz, pleaded guilty to assisting India-based tech support scam centers that stole millions from US citizens.

🐛 Vulnerabilities

Chromium Flaw Exposes Browsers to Remote Code Execution

Google accidentally leaked details of an unfixed Chromium flaw that allows remote code execution on devices, impacting all Chromium-based browsers.

👁 Privacy

Tech Giants Pledge to Protect Kids Online

Major tech firms, including Snapchat and Meta, have promised to make changes to their platforms to better protect children from harmful content and grooming.

📊 Analysis

Trump Delays AI Security Executive Order

President Donald Trump has postponed the release of an executive order focused on AI security, citing concerns it could harm US AI industry competition with countries like China.

🐛 Vulnerabilities

UK Cybercrime Law Reform Plans

The UK's proposed cybercrime law reform would offer limited legal protections, leaving most security researchers vulnerable to prosecution.

🐛 Vulnerabilities

GitHub Internal Repositories Compromised

GitHub's internal repositories were impacted after an employee device was compromised through a poisoned Visual Studio Code extension, with critical secrets rotated and the highest-impact credentials prioritized first.

🐛 Vulnerabilities

CISA Credential Leak Raises Alarms

A reported public exposure of sensitive CISA credential data on GitHub has raised concerns and prompted Congress to demand answers from the agency.

123 53 Next →