A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
The incident highlights growing supply-chain risks in crypto security as attackers shift from code exploits to abusing trusted software distribution channels.