In early April 2025, security researchers confirmed that North Korean state-sponsored hackers had successfully compromised the Axios HTTP library. It is one ...
Spread the loveThe digital landscape is continuously evolving, and with it, the necessity for robust cybersecurity measures has never been more critical. Recent findings by CloudSEK’s BeVigil have ...
An emerging threat cluster is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to steal credentials ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.