Amazon Web Services has launched Kiro, a spec-driven AI development environment designed to take software from prototype to ...
The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of spreading to other projects.
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised ...
New offerings include DefenseClaw, an open-source agent framework designed to automate security and inventory, and AI Defense: Explorer Edition, which provides self-service tools for developers to ...
Google and Back Market’s $3 ChromeOS Flex USB Kit offers Windows 10 users a low-cost way to revive older PCs as support winds ...
Self-propagating npm worm steals tokens via postinstall hooks, impacting six packages and expanding supply chain attacks.
If you’ve been a victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse. Threat actors are using AI to supercharge ...
Danquah, P. and Bekoe, S. (2026) Cyber Deception and Theft: A Critical Review. Journal of Information Security, 17, 149-166.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results