North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
OpenAI says GPT-5 will unify breakthroughs from different models
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA
Ingram Micro starts restoring systems after ransomware attack
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)