2026


Nx Console Compromise: A Wake-Up Call for Developers

Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studi...

Code Mastery Centre 19 May, 2026

Mistral AI's Bold Move: Acquiring Emmi for Industrial Innovation

Mistral AI , France's most valuable artificial intelligence company, announced on Tuesday that it has acquired Vienna-based Emmi AI , ...

Code Mastery Centre 19 May, 2026

Cybersecurity Alert: Critical Flaws in Ivanti and Fortinet

Ivanti, Fortinet , n8n , SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to...

Code Mastery Centre 18 May, 2026

AI Model Collapse: How One Data Point Changes Everything

A team of international researchers has demonstrated that incorporating just one real-world data point into AI training can prevent " m...

Code Mastery Centre 18 May, 2026

Google I/O 2026: The Future of AI and Innovation

Google's annual developer conference, Google I/O 2026 , kicks off Tuesday, May 19, at the Shoreline Amphitheatre in Mountain View, Cal...

Code Mastery Centre 18 May, 2026

What Cyber Flaws Did Mythos AI Expose?

Anthropic is preparing to brief the Financial Stability Board on cybersecurity vulnerabilities in the global financial system exposed by...

Code Mastery Centre 18 May, 2026

PyTorch Lightning Security Breach: Lessons Learned

Two malicious versions of the widely used PyTorch Lightning deep learning framework were pushed to the Python Package Index on April 30,...

Code Mastery Centre 10 May, 2026

Dirty Frag Exposed: What Every Linux User Should Know

A newly disclosed Linux kernel vulnerability dubbed " Dirty Frag " allows any unprivileged local user to gain full root access ...

Code Mastery Centre 10 May, 2026

Qwen AI: Bridging the Gap Between Cloud and Commerce

Alibaba's Qwen family of artificial intelligence models has rapidly expanded its footprint across the world's largest cloud platf...

Code Mastery Centre 10 May, 2026

The Hidden Dangers of Microsoft Phone Link Revealed

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous...

Code Mastery Centre 6 May, 2026

Google Strengthens Android Security with Public Verification

Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks . "This ...

Code Mastery Centre 6 May, 2026

Inside the MuddyWater Attack: A Cybersecurity Analysis

The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a...

Code Mastery Centre 6 May, 2026

DeFi's Security Crisis: Understanding the 85x Hack Rate

Decentralized finance loses money to hackers at a rate roughly 85 times higher than traditional finance relative to transaction volume, a...

Code Mastery Centre 4 May, 2026

Mythos: A Game Changer in Vulnerability Detection

The emergence of Anthropic's Claude Mythos has set off a chain reaction across the cybersecurity landscape, as the AI model's abi...

Code Mastery Centre 4 May, 2026