Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal ...
Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
Type a URL, endpoint, everything. The AI scans it, finds vulnerabilities, and writes the report. You watch, approve, and steer — like pair-programming, but for security. It follows real pentest ...