1. |
Blockchain Security – Protecting Decentralized Systems |
|
|
2. |
Adversarial Machine Learning – Securing AI Models |
|
|
3. |
Printer Company Offered Malicious Drivers Infected With XRed Malware |
|
|
4. |
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads |
|
|
5. |
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication |
|
|
6. |
APPLE-SA-05-12-2025-9 Safari 18.5 |
|
|
7. |
Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development |
|
|
8. |
SEC Consult SA-20250506-0 :: Honeywell MB Secure Authenticated Command Injection |
|
|
9. |
CVE-2025-30072 Tiiwee X1 Alarm System - Authentication Bypass by Capture-replay |
|
|
10. |
WebKitGTK and WPE WebKit Security Advisory WSA-2025-0004 |
|
|
11. |
Excel(ent) Obfuscation: Regex Gone Rogue |
|
|
12. |
U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters |
|
|
13. |
Three Vulnerabilities Expose Apache IoTDB to Attacks |
|
|
14. |
New Weaponized PyPI Package Attacking Developers to Steal Source Code |
|
|