$ page 14/35

Critical flaw in Langflow AI platform under attack

A critical code injection vulnerability in the Langflow AI framework is under active attack, with threat actors exploiting it within hours of disclosu

2 min readApr 2

WhatsApp warns iPhone users of fake app distributing potent spyware

Meta has warned iPhone users of a fake WhatsApp application designed by an Italian surveillance firm to install spyware that can steal data and record

2 min readApr 2

Lloyds IT glitch exposed data of nearly 500,000 banking customers

An internal IT glitch in Lloyds Banking Group's mobile app exposed transaction data for nearly 500,000 customers, raising serious privacy concerns.

6 min readApr 2

Critical vulnerability in Claude Code emerges days after source leak

A deep dive into the critical vulnerability found in Anthropic's Claude Code, exploring the technical details, impact, and how it serves as a major se

6 min readApr 2

France's social media age gate bill: A child safety win or a privacy nightmare?

France's bill to require parental consent for social media access for under-15s aims to protect children but introduces serious privacy risks through

6 min readApr 2

Drift Protocol's averted crisis: A whitehat rescue, not a multi-million dollar heist

Initial reports of a major heist at Drift Protocol were wrong. We analyze how a whitehat intervention prevented millions in losses amid Solana network

6 min readApr 2

Medtech giant Stryker fully operational after data-wiping attack

Medtech giant Stryker recovered from a destructive data-wiping attack by an Iranian-linked group, highlighting the rising threat of geopolitical hackt

6 min readApr 2

Medtech giant Stryker recovers from claimed Iranian wiper attack, highlighting critical infrastructure risks

Medtech giant Stryker restored systems after a claimed wiper attack by the Iranian-aligned Handala group, a stark reminder of geopolitical cyber threa

5 min readApr 2

WebRTC skimmer bypasses CSP to steal payment data from e-commerce sites

A novel payment skimmer uses WebRTC data channels to bypass security controls like CSP, covertly stealing credit card details from online shoppers.

6 min readApr 2

FCC seeks to expand security blacklist, potentially impacting future router sales

The FCC is seeking public comment on expanding its "Covered List" criteria, a move that could pave the way for future restrictions on foreign-made rou

2 min readApr 2

Mercor hit by LiteLLM supply chain attack as Lapsus$ claims massive data theft

AI recruiting firm Mercor investigates a massive 4TB data breach claimed by the Lapsus$ group, allegedly stemming from a supply chain attack on LiteLL

6 min readApr 2

The FCC's ban on Huawei and ZTE equipment: A deep dive into the national security ruling

The FCC has prohibited new equipment from Huawei, ZTE, and others over national security risks. We analyze the technical concerns and what it means fo

6 min readApr 2