Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OUT OF BAND | The Breaking Point: Inside Mythos' Zero-Day Machine with Anthropic's Nicholas Carlini

Nicole Perlroth sits down with Nicholas Carlini for an Out of Band conversation on the imminent zero-day surge. Carlini explains what Mythos can already do: find and exploit flaws in some of the world’s most hardened, widely deployed software—with minimal human input. He details what Mythos has already hacked, which now includes most of the operating systems in use.

"A Mini Shai-Hulud Has Appeared": Bun-Based Stealer Hits SAP @cap-js and mbt npm Packages

On April 29, 2026, attackers published malicious versions of four npm packages in the SAP development ecosystem: mbt, @cap-js/db-service, @cap-js/sqlite, and @cap-js/postgres. Each compromised release ships a preinstall hook that downloads the Bun JavaScript runtime from GitHub Releases and uses it to execute an ~11.6 MB obfuscated credential stealer.

What Is the Best Free Antivirus Software to Protect Your Device?

A lot of times, people only worry about the best antivirus software before it’s too late; they may have accidentally downloaded or opened a file containing malware, causing file corruption, data loss, or even encrypting their device. There are many free antivirus software options, and the best antivirus products out there also offer additional features to help further protect your device.

Bugs & Betrayal - Vect Analysis

Vect is a newly observed RaaS operation that emerged in December of 2025, with affiliate recruitment and victim postings following shortly after in January 2026. Following the 19th of March 2026 Trivy/LiteLLM supply chain attack conducted by TeamPCP, in which ~340 GB uncompressed data was stolen, Vect announced on the dark web forum “Breached” that they would be partnering with TeamPCP.

Do you want to stop your Mac's battery from draining? Here's what you need to do!

Although MacBook batteries are meant to last for quite some time, the truth is that these batteries can be inherently difficult to manage sometimes. That's why the most important thing is to learn what drains the battery's power and how you can stop this issue to the best of your capabilities. Here's what you need to take into account.

The Silent Data Problem in Hospitals

We’ve all been there: a temporary file created for a claim gets saved and forgotten. Ten years later, that "temporary" file is a massive liability. Stephen Bader from Powers Health shares how they are tackling sensitive data sprawl. It’s not malicious; it’s just how work happens. But identifying and securing that PHI is a multi-year project every healthcare system needs to start today. Hear how Powers Health is cleaning up their data footprint with Josh Howell.

How to Protect Backups from Ransomware with NAKIVO's Malware Scan

Backups have become a primary target for ransomware. Hackers want to ensure that companies pay the ransom by not allowing them to recover their data independently. With NAKIVO Backup & Replication, you get several features (for example, immutable backup targets) to ensure that once created, a backup cannot be infected or corrupted with a new ransomware infection.

Alert: WhatsApp Phishing Campaign Delivers Malware

A new phishing campaign is using WhatsApp messages to deliver malware, according to researchers at Microsoft. The attackers are attempting to trick users into installing malicious Visual Basic Script (VBS) files. “The campaign relies on a combination of social engineering and living-off-the-land techniques,” Microsoft says.