Explore real-world engineering experiences from top tech companies.
Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
GitGuardian's State of Secrets Sprawl 2026 report reveals that hardcoded secret leaks accelerated dramatically in 2025, with 29 million new secrets exposed — a 34% year-over-year increase.
Censys researchers uncovered CTRL, a Russian-origin remote access toolkit distributed via malicious LNK files disguised as private key folders.
Three China-linked threat clusters conducted a coordinated cyber campaign targeting a Southeast Asian government organization in 2025.
Cloudflare announces Client-Side Security using a GNN+LLM cascading classifier to detect malicious JavaScript with fewer false positives.
This article covers Iran-linked hacktivist group Handala Hack Team's recent cyberattacks, including breaching FBI Director Kash Patel's personal email and launching a destructive wiper attack on Fortune 500 company Stryker.
This article covers CVE-2026-3055, a critical memory overread vulnerability (CVSS 9.3) in Citrix NetScaler ADC and Gateway that is under active reconnaissance and exploitation.
Proofpoint has disclosed a spear-phishing campaign by Russian state-sponsored group TA446 (also known as Callisto, COLDRIVER, Star Blizzard) leveraging the DarkSword iOS exploit kit.
CISA added CVE-2025-53521, a critical F5 BIG-IP APM vulnerability, to its Known Exploited Vulnerabilities catalog after confirmed in-the-wild exploitation.
Apple is issuing Lock Screen notifications to iPhones and iPads running outdated iOS versions to warn users about active web-based exploit kits.
This article covers a TeamPCP supply chain attack on the telnyx Python package, hiding malware inside .WAV files via audio steganography.
This article covers a now-patched vulnerability in Open VSX's pre-publish extension scanning pipeline that allowed malicious VS Code extensions to bypass security checks.
This article covers two phishing campaigns: one targeting TikTok for Business accounts via AitM techniques, and another using SVG attachments to deliver malware in Venezuela.