
Nx package committed to cloud administrative control in 72 hours
In August 2025 a gap in the software supply chain again showed that the weakest link may be in the developer's workflow. A committed version of the nx package published in npm inc…
News about data leaks, security gaps and information exposure

In August 2025 a gap in the software supply chain again showed that the weakest link may be in the developer's workflow. A committed version of the nx package published in npm inc…

The United States Agency for Infrastructure and Cybersecurity (CISA) has raised the alarm about high-gravity vulnerability in Ivanti Endpoint Manager (EPM) and has ordered federal…

A malicious package published in the npm record is passed through a legitimate installer called OpenClaw and has been used to deploy a remote access Trojan (RAT) that steals sensi…

The US subsidiary of Ericsson has confirmed that it suffered a data leak after an external supplier, responsible for storing personal information from employees and customers, det…

Password reviews are part of the security ritual in many organizations: they serve to demonstrate compliance, reduce obvious risks and show that basic controls exist. However, too…

In recent weeks, worrying cases of extensions have come to light for Google Chrome that, after being changed hands, have become attack vectors capable of running malicious code an…

In recent weeks security researchers have detected a phishing campaign that takes over an unusual corner of the Internet to hide their traps: the special domain .harpa, used histo…

In a recent operation documented by the MalBeacon cyberintelligence firm, the Ransomware group known as Velvet Temper (also traced as DEV-0504) used a mix of social deception and …

The massive data filtration in TriZetto Provider Solutions has again shaken the delicate balance between technology and health. According to documents submitted by the Maine prose…