UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft and cloud destruction. A threat actor known as UNC6426 leveraged keys stol...
An unknown hacker manipulated Anthropic’s Claude in a data breach against Mexico’s government, stealing 150GB of tax and voter records. The rise of artificial intelligence has brought incr...
Protos takes a look back at 2025’s biggest, strangest, and most significant crypto hacks. Have we learned anything? 2025 delivered no shortage of crypto hacks and scams, though one incident stoo...
The human layer is one of the most vulnerable when it comes to crypto security, but authentication, hardware wallets, automation and strict verification habits are key to reducing risk. The majority o...
China Exploits US-funded Research on Nuclear Technology, a Congressional Report Says WASHINGTON (AP) — China is exploiting partnerships with U.S. researchers funded by the Department of Energy to prov...
A congressional report says China exploits partnerships with U.S. researchers to give its military access to nuclear technology and other innovations with economic and national security applications. ...
Charlie Kirk was a mentor, a leader, and a voice that reshaped the direction of American politics. Don’t exploit his death. Charlie Kirk was assassinated on stage in front of a crowd. For millio...









