North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
OpenAI says GPT-5 will unify breakthroughs from different models
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA
Ingram Micro starts restoring systems after ransomware attack
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update