Explore real-world engineering experiences from top tech companies.
Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
This article covers a phishing campaign by threat actor UAC-0255 that impersonated Ukraine's CERT-UA to distribute the AGEWHEEZE remote access trojan.
Microsoft has identified a malware campaign distributing malicious VBS files via WhatsApp messages to compromise Windows systems.
Cloudflare shares results of an independent privacy audit for its 1.1.1.1 public DNS resolver, 8 years after launch.
This article argues that traditional enterprise security's "block everything" approach creates a shadow workaround economy that increases risk rather than reducing it.
A multi-stage phishing campaign targets Spanish-speaking users in Latin America and Europe to deliver the Casbaneiro banking trojan via the Horabot malware.
Google released Chrome security updates addressing 21 vulnerabilities, including a zero-day (CVE-2026-5281) actively exploited in the wild.
This article explores why attackers increasingly use legitimate tools already present in target environments instead of traditional malware.
Google has attributed the supply chain attack on the Axios npm package to North Korean threat group UNC1069, which has been operational since 2018.
Anthropic confirmed that internal source code for Claude Code was accidentally leaked via an npm packaging error in version 2.1.88, exposing nearly 2,000 TypeScript files and over 512,000 lines of code.
This article covers the exploitation of a zero-day vulnerability (CVE-2026-3502) in TrueConf video conferencing software targeting Southeast Asian government networks in a campaign called TrueChaos.
Google Threat Intelligence Group (GTIG) details an active supply chain attack on the axios NPM package attributed to North Korea-linked threat actor UNC1069.
Palo Alto Networks Unit 42 disclosed a security vulnerability in Google Cloud's Vertex AI platform where AI agents could be weaponized to access sensitive data.