A major security breach has compromised the Cetus Protocol, a decentralised exchange operating on the Sui blockchain, resulting in the loss of approximately $260 million in digital assets. The exploit has raised serious concerns about the security of decentralised finance platforms and the robustness of blockchain-based trading systems. The
Runner H, Surfer H and Tester H, three autonomous AI agents developed by Paris-based H Company, make web-native task automation available across consumer and enterprise settings. The framework integrates advanced vision–language models that perceive browser interfaces and predict actions like clicking buttons
Security researchers have uncovered an enormous password cache comprising 16 billion unique login credentials spanning major platforms such as Apple, Facebook, Google, Telegram, GitHub, VPN services and even government portals—making it the largest credential leak known to date. These credentials were
Organisations grappling with escalating cyber threats are increasingly turning to open‑source Security Operations Center tools to establish proactive, cost‑effective defences. These solutions deliver SIEM, threat detection, incident response, and network monitoring capabilities while offering transparency, flexibility, and community‑driven innovation. Open‑source