IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
North Korean-linked campaign publishes 26 malicious npm packages hiding C2 in Pastebin, deploying credential stealers & RAT via 31 Vercel deployments.
The Sophia Script is an open-source PowerShell module designed to debloat and fine-tune Windows 11 (and Windows 10 ). It is ...
Rockchip RK3588 and RK3576 get mainline Linux support for H.264 (AVC) and H.265 (HEVC) hardware video coders thanks to work from Collabora.
Safe coding is a collection of software design practices and patterns that allow for cost-effectively achieving a high degree ...
HP Tuners has unlocked the factory E68 engine control module, opening the door for aftermarket power upgrades for both the C8 ...
This is one example of the way the service’s Transformation-in-Contact model is helping to shape new technology, courtesy of ...
Check Point research found three critical flaws in Anthropic's Claude Code that allow attackers to execute arbitrary commands and steal API keys through repository ...
The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, ...
With native J2534 pass-thru and topology mapping, Topdon's new OBD2 scanner line offers a lot of high-tier functionality for the price.
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
After months of real-world testing of AI copilots, chat interfaces, and AI-generated apps, Terra Security releases a new module for continuous AI Penetration Testing to match AI development velocity ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results