The campaign leverages a newly-discovered phishing kit called VENOM.
Laura French
The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.
The axios npm package, with about 100 million weekly downloads, was compromised via a maintainer’s account.
A command injection hidden in a branch name could cause an OAuth token to be exfiltrated.
OX Security found AI coding assistants make the same common mistakes as humans.
Identity talks in San Francisco focused on new realities challenging traditional authentication schemes.
Keynotes from Splunk and the SANS Institute reinforce the double-edged nature of AI.
“Cybersecurity practitioners who use AI are likely to replace those who don’t,” said SANS Institute CEO James...
CVE-2026-33017 could enable an unauthenticated attacker to execute arbitrary Python code on the server.
JavaScript is used to imitate a glitchy Zoom call, prompting the user to install an “update.”