Breach of Confidence: 3 April 2026
I once tried to assemble IKEA furniture this week without looking at the instructions. Got halfway through before realising...
I once tried to assemble IKEA furniture this week without looking at the instructions. Got halfway through before realising...
Ravie LakshmananApr 03, 2026Threat Intelligence / Malware The maintainer of the Axios npm package has confirmed that the supply chain compromise...
The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS...
Ravie LakshmananApr 03, 2026Mobile Security / Threat Intelligence Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple...
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that...
While chatbots can talk about “internal states” like feeling tired, excited, happy, sad, or hungry, they don’t actually experience these...
MAI-Voice-1 generates “natural, realistic speech, rich with nuance, emotional range, and expression,” according to Microsoft, and was built to preserve...
Digital Forensics and Incident Response (DFIR) is the discipline that combines the technical investigation of cyber incidents with the structured...
A cyber incident response team (CIRT) is your organisation’s first line of defence when a security incident occurs. Building an...
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes at scale — managing everything from national electricity...
TL;DR Security cameras, IoT, and OT devices that are meant to protect us, are easily compromised and turned against...
Ravie LakshmananApr 02, 2026Vulnerability / Threat Intelligence A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection...
TrendAI would like to commend the White House Office of the National Cyber Director (ONCD), led by Sean Cairncross, and...
Image: sergign/Envato Elements Chrome just became the latest battlefield in an ongoing war over memory safety. Google has pushed an...
Posted by Adam Gavish, Google GenAI Security TeamIndirect prompt injection (IPI) is an evolving threat vector targeting users of complex...