PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push…
BlogInsights, tips, and news from the frontlines of cybersecurity.
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push…
BlogThe internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to…
BlogCybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent…
BlogIntro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically…
BlogCybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user…
BlogCybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware.…
BlogCybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project…
BlogIn February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups…
BlogEvery security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards…
BlogcPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to…
BlogGet the latest security tips and industry news delivered to your inbox.
No spam. Unsubscribe anytime.
Let's talk about how we can protect and power your digital operations.