Cognizant’s TriZetto Subsidiary Reports Data Breach Affecting 3.4 Million Patients

Cognizant’s TriZetto Subsidiary Reports Data Breach Affecting 3.4 Million Patients

TriZetto Provider Solutions, a healthcare-technology subsidiary of Cognizant, has disclosed a large data breach that exposed the protected health information of 3,433,965 patients. The company classified the incident as an external system hacking event after threat actors gained unauthorized access to TriZetto’s external infrastructure. Timeline and discovery Initial unauthorized access occurred on November 19, 2024. TriZetto did not detect the

Clipboard Trap: ClickFix Now Abuses Windows Terminal to Deliver Lumma Stealer

Clipboard Trap: ClickFix Now Abuses Windows Terminal to Deliver Lumma Stealer

A newly observed wave of ClickFix social-engineering attacks has shifted tactics, hijacking Windows Terminal as its execution environment to deliver credential-stealing malware. Security researchers from Microsoft and other vendors tracked this campaign in early 2026 and reported a reliable pattern: victims are manipulated into pasting an obfuscated command from their clipboard into a legitimate-looking terminal window, which then decodes and

When Claude Became a Bug Hunter: How an AI Found 22 Firefox Vulnerabilities in Two Weeks

When Claude Became a Bug Hunter: How an AI Found 22 Firefox Vulnerabilities in Two Weeks

In February 2026, a focused collaboration between Anthropic and Mozilla demonstrated a new phase in vulnerability research: large language models (LLMs) moving beyond assistance into active, high-throughput discovery. Over a two-week engagement, Claude Opus 4.6 performed deep analysis of the Firefox codebase and surfaced 22 distinct security flaws. The scope and speed of these findings — especially the 14 issues

90 Zero‑Days in 2025: Google’s Snapshot of an Evolving Exploit Economy

90 Zero‑Days in 2025: Google’s Snapshot of an Evolving Exploit Economy

Google’s Threat Intelligence Group reported 90 zero‑day vulnerabilities actively exploited in the wild across 2025. That total sits above 2024’s 78 but below the record 100 observed in 2023. Beyond the raw count, the GTIG data reveals a notable shift in where and how these flaws were used, who is using them, and which technical weaknesses continue to drive high‑impact

From Tunnel to Cloud: The 2026 Strategy Guide to Self‑Hosting vs Third‑Party VPN

From Tunnel to Cloud: The 2026 Strategy Guide to Self‑Hosting vs Third‑Party VPN

In 2026 the boundary between “VPN” and “personal cloud” is fuzzier than ever. A third‑party VPN still sells one‑click privacy and wide geo-hopping, but for many users that convenience now trades away transparency, extensibility, and long‑term value. Renting a small VPS and running WireGuard, AdGuard Home, Vaultwarden, and automation tools like n8n converts a disposable privacy tool into a persistent