The Hidden Tracking Risk Inside Your Tires
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can...
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can...
Rapid7’s research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here’s what BPFdoor is, how it evolved, and...
Attribution analysis Based on technical artifacts, infrastructure overlaps, and victimology, TrendAI™ Research attributes this campaign to Pawn Storm with high confidence. This...
Sanchit Vir Gogia, chief analyst at Greyhound Research, said the move goes beyond product consolidation. “This is not a clean...
Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two...
In July 2024, Google approached Wiz with a $23 billion acquisition offer. Wiz declined. By 2026, reports suggest Google...
Sonatype Security Research has identified two hijacked npm packages in the React Native ecosystem that receive more than 30,000...
Hackers targeted Poland’s National Centre for Nuclear Research Pierluigi Paganini March 13, 2026 Hackers targeted Poland’s National Centre for Nuclear...
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of...
Tenable Research revealed “LeakyLooker,” a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have...
New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding...
NisosExposing a Fraudulent DPRK Candidate Executive Summary Since early 2023, Nisos has provided our clients with critical insights and...
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused...
The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built...
On January 12, 2026, Apple made a decision that shocked Silicon Valley: they chose Google's Gemini to power the...