Two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim ...
Aikido Security is launching Aikido Endpoint, a lightweight agent designed to protect developers’ endpoints against supply ...
Belgian cybersecurity company Aikido Security BV today launched Endpoint, a lightweight security agent designed to secure ...
GHENT, Belgium, April 20, 2026 (GLOBE NEWSWIRE) -- Aikido Security today launched Aikido Endpoint, a lightweight security agent that protects developer devices against software supply chain attacks by ...
But if you feel you absolutely must use it, or are just curious, enabling Lockdown Mode on your iPhone is easy. Open the ...
Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
This week, a "Raccoon"-linked actor hit help desks, Eurail exposed 308K users, Fortinet patched critical flaws, Pushpaganda ...
The supply chain attack on third-party library Axios has forced OpenAI to revoke its code-signing certificate and require ...
Policymakers must work with frontier AI labs to establish reporting requirements for security incidents similar to the one that Anthropic revealed in 2025. Effective disclosure will require consistent ...
An attacker purchased 30+ WordPress plugins on Flippa, planted backdoors that lay dormant for eight months, then activated ...
Backed by Sonatype's industry-leading security research team, Sonatype Repository Firewall helped customers prevent 136,107 open source malware attacks in Q1. To explore the full findings from the Q1 ...
Adobe patches a critical PDF flaw exploited for months, allowing attackers to bypass sandbox protections and deliver malware.