Skip to content
Security News, Assessments & Alerts Page 14

Security News, Assessments & Alerts

Security Issues, Vulnerabilities, Exploits & Government Alerts

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently in favor of what’s already inside your… 

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Ravie LakshmananApr 01, 2026Threat Intelligence / Software Security Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. “We… 

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Ravie LakshmananApr 01, 2026Data Breach / Artificial Intelligence Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, had been inadvertently released due to a human error. “No… 

Android Developer Verification Rollout Begins Ahead of September Enforcement

Android Developer Verification Rollout Begins Ahead of September Enforcement

Ravie LakshmananMar 31, 2026Mobile Security / Compliance Google on Monday said it’s officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful apps while “hiding behind anonymity.”… 

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

Ravie LakshmananMar 31, 2026Zero-Day / Vulnerability A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in… 

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Ravie LakshmananMar 31, 2026Cloud Security / AI Security Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker… 

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT. “The operation covers VPN clients, encrypted messengers,…