Source Code Exfiltration in Google Antigravity‍TL;DR: We explored a known issue in Google Antigravity where attackers can ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Security researchers have uncovered a new supply chain attack targeting the NPM registry with malicious code that exhibits worm-like propagation capabilities. Dubbed Sandworm_Mode, the attack was ...
The current z.base64() type doesn't allow any whitespace in Base64 encoded strings, however, other tools seem to ignore whitespace, and it's apparently part of the Base64 RFC. For example in the ...
Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG ...
Just when you thought 3D printing had reached its limits, researchers are now reaching into unseen realms — literally. A new experimental initiative at the University of Western Oslo’s Advanced ...
Weaver Ant, a cyberespionage-focused APT operating out of China, is targeting telecom providers for persistent access. Cyber response firm Sygnia warns of a newly identified China-linked APT that ...
Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply by sending specially crafted emails to the SMTP server. The Zimbra remote ...
A picture may be worth a thousand words, but how many numbers is a word worth? The question may sound silly, but it happens to be the foundation that underlies large language models, or LLMs — and ...