Guidance for CSA members on deploying post-quantum crypto in cloud-native zero-trust architectures, with priorities, timelines, and governance.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
LiteLLM 1.82.7–1.82.8 supply chain attack exposed 33,185 secrets across 6,943 machines, leaving 3,760 valid credentials ...
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell ...
Meta has indefinitely paused work with $10B AI data startup Mercor after a LiteLLM supply chain attack exposed training ...
CERT-EU attributed a 92 GB data breach at the European Commission to TeamPCP, which compromised the Trivy security scanner in ...
The European Union’s Computer Emergency Response Team, CERT-EU, has traced last week’s theft of data from the Europa.eu ...
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
UNC1069 compromised Axios 1.14.1 and 0.30.4 via social engineering, impacting 100M weekly downloads and exposing supply ...
After the supply chain attack on LiteLLM, attackers were able to access internal Cisco data, it is said. Source code from ...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to ...
The platform routes and governs LLM traffic across OpenAI, Anthropic, Google, and Bedrock through one single API, with spend ...