Frontier AI models are reshaping cybersecurity—accelerating both defenders and attackers simultaneously. Here’s the strategic battleground, recent supply chain attacks, and what defenders must do now.
Read MoreTrojanized LiteLLM releases on PyPI enabled data exfiltration with Kubernetes persistence—here’s the full attack chain and how to check if you’re affected.
Read MoreAxios npm package compromised—attackers hijacked the maintainer’s account and injected a phantom dependency that dropped a cross-platform RAT. Here’s the full attack chain.
Read More