The worm has returned. Shai-Hulud 2.0 has compromised over 25,000+ malicious repos across ~350 GitHub users by weaponizing the developers themselves. Discover how this recursive supply chain attack works and how to sanitize your registry.
The worm has returned. Shai-Hulud 2.0 has compromised over 25,000+ malicious repos across ~350 GitHub users by weaponizing the developers themselves. Discover how this recursive supply chain attack works and how to sanitize your registry.
The community-driven Ingress-NGINX controller is retiring. Explore the reasons, its link to the critical 'IngressNightmare' vulnerability, and what this means for your Kubernetes security and migration strategy.
Dive deep into the MITRE ATT&CK v18 update. Discover crucial changes to detection analytics, expanded Mobile and ICS matrices, and how to leverage the latest adversary intelligence for a stronger defense.
Stay ahead of emerging threats with our in-depth analysis of the OWASP Top 10 2025. Discover the new risks, including Software Supply Chain Failures, and learn how to fortify your web application security.
A critical RCE vulnerability in WSUS (CVE-2025-59287) creates a 'Code-Zombie' threat. This is your immediate action plan to patch, hunt, and harden your Windows fleet.
A recap of Pwn2Own Dublin 2025, where hackers earned over $1 million for 73 unique zero-day vulnerabilities, including a full compromise of the new Samsung Galaxy S25.