Critical flaw in Langflow AI platform under attack
A critical code injection vulnerability in the Langflow AI framework is under active attack, with threat actors exploiting it within hours of disclosu
WhatsApp warns iPhone users of fake app distributing potent spyware
Meta has warned iPhone users of a fake WhatsApp application designed by an Italian surveillance firm to install spyware that can steal data and record
Lloyds IT glitch exposed data of nearly 500,000 banking customers
An internal IT glitch in Lloyds Banking Group's mobile app exposed transaction data for nearly 500,000 customers, raising serious privacy concerns.
Critical vulnerability in Claude Code emerges days after source leak
A deep dive into the critical vulnerability found in Anthropic's Claude Code, exploring the technical details, impact, and how it serves as a major se
France's social media age gate bill: A child safety win or a privacy nightmare?
France's bill to require parental consent for social media access for under-15s aims to protect children but introduces serious privacy risks through
Drift Protocol's averted crisis: A whitehat rescue, not a multi-million dollar heist
Initial reports of a major heist at Drift Protocol were wrong. We analyze how a whitehat intervention prevented millions in losses amid Solana network
Medtech giant Stryker fully operational after data-wiping attack
Medtech giant Stryker recovered from a destructive data-wiping attack by an Iranian-linked group, highlighting the rising threat of geopolitical hackt
Medtech giant Stryker recovers from claimed Iranian wiper attack, highlighting critical infrastructure risks
Medtech giant Stryker restored systems after a claimed wiper attack by the Iranian-aligned Handala group, a stark reminder of geopolitical cyber threa
WebRTC skimmer bypasses CSP to steal payment data from e-commerce sites
A novel payment skimmer uses WebRTC data channels to bypass security controls like CSP, covertly stealing credit card details from online shoppers.
FCC seeks to expand security blacklist, potentially impacting future router sales
The FCC is seeking public comment on expanding its "Covered List" criteria, a move that could pave the way for future restrictions on foreign-made rou
Mercor hit by LiteLLM supply chain attack as Lapsus$ claims massive data theft
AI recruiting firm Mercor investigates a massive 4TB data breach claimed by the Lapsus$ group, allegedly stemming from a supply chain attack on LiteLL
The FCC's ban on Huawei and ZTE equipment: A deep dive into the national security ruling
The FCC has prohibited new equipment from Huawei, ZTE, and others over national security risks. We analyze the technical concerns and what it means fo











