Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
Wed, 22 Apr 2026 23:25:00 +0530
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
Wed, 22 Apr 2026 23:03:00 +0530
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
Wed, 22 Apr 2026 20:58:00 +0530
Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
Wed, 22 Apr 2026 16:25:00 +0530
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
Wed, 22 Apr 2026 14:59:00 +0530
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
Wed, 22 Apr 2026 13:28:00 +0530
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
Wed, 22 Apr 2026 12:46:00 +0530
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
Tue, 21 Apr 2026 23:48:00 +0530
22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
Tue, 21 Apr 2026 21:16:00 +0530
Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
Tue, 21 Apr 2026 20:01:00 +0530
NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs
Tue, 21 Apr 2026 18:15:00 +0530
No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
Tue, 21 Apr 2026 17:00:00 +0530
Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution
Tue, 21 Apr 2026 15:52:00 +0530
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
Tue, 21 Apr 2026 11:53:00 +0530
SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
Mon, 20 Apr 2026 22:44:00 +0530
⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
Mon, 20 Apr 2026 19:11:00 +0530
Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
Mon, 20 Apr 2026 16:12:00 +0530
Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
Mon, 20 Apr 2026 13:04:00 +0530
Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
Mon, 20 Apr 2026 09:05:00 +0530
[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data
Sat, 18 Apr 2026 13:37:00 +0530
$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
Sat, 18 Apr 2026 13:29:00 +0530
Share this story
Industry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREThe key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MORELet us know what you think about the article.