Device code phishing targets 340+ Microsoft 365 orgs since Feb 2026 via OAuth abuse, enabling persistent token hijacking and account takeover.
The hackers compromised GitHub Action tags, then shifted to NPM, Docker Hub, VS Code, and PyPI, and teamed with Lapsus$.
Enterprises have tethered their most consequential operations to AI agents & neglected to secure the ingress. This article explains the gravity of this threat.
Security vendors have spent years building up defenses around the endpoint, but one researcher says AI coding tools have ...
Autonomous AI coding agents are shipping code faster than security teams can review it. Here’s why the governance gap is bigger than most organizations realize ...
HMRC said that MFA will provide greater protection as agents sign in to its services. Credit: Mehaniq/Shutterstock.com. (Mehaniq/Shutterstock.com.) HM Revenue & Customs (HMRC) in the UK has outlined ...
Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime ...
As the United States and its competitors race to field AI capabilities, the decisive edge will belong to whoever can deploy ...
Regulatory regimes such as the EU FMD and U.S. DSCSA drive serialization to strengthen visibility and oversight, but these ...
TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide. This analysis walks through the Trivy supply‑chain compromise, attacker ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results