Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a…
Browsing: Compromise
Ravie LakshmananApr 02, 2026Network Security / Vulnerability Cisco has released updates to address a critical security flaw in the Integrated Management…
The software supply chain attack that resulted in the compromise of npm packages of Axios, an extremely popular HTTP client…
I write for a living, but I do it on my desktop. Well, mostly. I’ll admit that I still draft…
The US Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2026-33017,…
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according…
A critical sandbox escape vulnerability in the n8n AI workflow automation platform could allow attackers to execute arbitrary commands on…
A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker’s…
Researchers at cybersecurity firm Tenable discovered two vulnerabilities that could be exploited to fully compromise instances of the Google Looker…
