https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak DeepSeek, a Chinese AI startup, has suffered a significant data breach, exposing sensitive user data and internal information. Two publicly accessible databases containing over a million log...
Let’s be honest – most security training is boring. Really boring. Annual compliance videos, outdated slideshows, generic best practices that don’t apply to your tech stack. No wonder developers tune out. But it doesn’t have to be this way. THE...
https://blog.pypi.org/posts/2025-01-30-archival The Python Package Index (PyPI) has implemented a new “Project Archiving” feature to enhance the security and transparency of the open-source ecosystem. This feature allows project maintainers to officially...
https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4 Google is fortifying its security measures following a recent, elaborate voice phishing attack documented by programmer Zach Latta. Latta, founder of Hack Club, detailed a close call he had with...
https://flatt.tech/research/posts/clone2leak-your-git-credentials-belong-to-us Multiple vulnerabilities have been discovered in popular Git clients, including GitHub Desktop, that could allow attackers to steal user credentials. These vulnerabilities, stemming from...
https://www.darkreading.com/cyber-risk/security-needs-start-saying-no-again For years, cybersecurity teams were often perceived as the “Department of No,” constantly blocking initiatives due to security concerns. However, in an effort to demonstrate value...