Factory 2.0 deepens security with new AI tools, Actions, and Skills to continuously reconcile open-source artifacts across ...
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers ...
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
The exploit did not involve a bug in Drift's code. It used "durable nonces," a legitimate Solana transaction feature, to pre-sign administrative transfers weeks before executing them, bypassing the ...
Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable ...
A series of malicious LNK files targeting users in South Korea has been detected using a multi-stage attack chain that uses ...
A simple prompt sent Claude Code on a mission that uncovered major security vulnerabilities in popular text editors — and ...