In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer…
Browsing: Cybersecurity
Sign-up forms that drag on, login steps that repeat, and access requests that take longer than expected have become a…
The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was…
T-Mobile USA has provided clarification on a recent data breach notification, stating that it was triggered by an insider incident…
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that…
AI agents can book travel, execute financial transactions, write and run code, and manage infrastructure without human intervention at each…
Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37…
A threat actor has been exploiting vulnerable Next.js applications to compromise systems and exfiltrate credentials at scale, Cisco’s Talos security…
The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS…
Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wild.…
