Data Breach Enterprise Security1 Min Read May 2, 2026 Trellix Confirms Source Code Breach With Unauthorized Repository Access Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "rece…
3 Min Read May 1, 2026 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign A newly discovered Vietnamese-linked operation has been observed using a… Malware Threat Intelligence
2 Min Read May 1, 2026 Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks Cybersecurity researchers are warning of two cybercrime groups that are… Malware Social Engineering
4 Min Read May 1, 2026 China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists Cybersecurity researchers have disclosed details of a new China-aligned… Network Security Vulnerability
Compliance Data Protection5 Min Read May 1, 2026 Top Five Sales Challenges Costing MSPs Cybersecurity Revenue The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being…
Data Breach Law Enforcement2 Min Read May 1, 2026 Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for…
Malware Supply Chain Attack2 Min Read May 1, 2026 Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Malware Supply Chain Attack3 Min Read April 30, 2026 PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…
Cybersecurity News Hacking News14 Min Read April 30, 2026 ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
Cloud Security Threat Intelligence3 Min Read April 30, 2026 New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities…
Enterprise Security Threat Intelligence16 Min Read April 30, 2026 EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation…
Linux Vulnerability2 Min Read April 30, 2026 New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user…
AI Security Vulnerability4 Min Read April 30, 2026 Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the…
Malware Supply Chain Attack3 Min Read April 29, 2026 SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with…
Malware Social Engineering7 Min Read April 29, 2026 New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by…
Artificial Intelligence Exposure Validation2 Min Read April 29, 2026 Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate…
Exposure Management Security Operations5 Min Read April 29, 2026 What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong) Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting…
Vulnerability Web Hosting4 Min Read April 29, 2026 Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain…
Network Security Vulnerability1 Min Read April 29, 2026 CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and…
Cloud Security Vulnerability3 Min Read April 29, 2026 LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
Software Security Vulnerability3 Min Read April 28, 2026 Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that…
Malware Supply Chain Attack4 Min Read April 28, 2026 Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players…
Malware Supply Chain Attack4 Min Read April 28, 2026 VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw…
Data Integrity Operational Technology4 Min Read April 28, 2026 Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a…
Network Security Vulnerability2 Min Read April 28, 2026 Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform…
Artificial Intelligence Enterprise Security4 Min Read April 28, 2026 After Mythos: New Playbooks For a Zero-Window Era When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know…
Cyber Espionage Vulnerability2 Min Read April 28, 2026 Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy. Xu Zewei, 34,…
Identity Management Vulnerability2 Min Read April 28, 2026 Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity…
Threat Intelligence Vulnerability3 Min Read April 28, 2026 Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has…
Linux Malware Ransomware Vulnerabilities5 Min Read April 28, 2026 FIRESTARTER: Cisco ASA Backdoor The Advisory That Changes EverythingOn April 23, 2026, CISA and the United Kingdom National Cyber Security Centre jointly assessed that…
Vulnerabilities2 Min Read April 28, 2026 Unfiltered: The 9.8 CVSS Deserialization Loophole Hijacking Apache MINA Apache MINA is widely recognized as a foundational network application framework, designed to help users easily develop high-performance and…
Security2 Min Read April 27, 2026 Robinhood account creation flaw abused to send phishing emails Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate…
Security2 Min Read April 27, 2026 GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update. Six…
Security2 Min Read April 27, 2026 Canada arrests three for operating “SMS blaster” device in Toronto Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts…
Browser Chrome Cybersecurity Data Security Extensions LayerX Privacy Security Surveillance2 Min Read April 27, 2026 82 Chrome Extensions Found Selling User Data, 6.5 Million Users Affected Most people install browser extensions without giving them much thought. Recent incidents, along with a new investigation by LayerX Security…
Security2 Min Read April 27, 2026 Alleged Silk Typhoon hacker extradited to US for cyberespionage A Chinese national accused of carrying out cyberespionage operations for China's intelligence services has been extradited from Italy to…
Anodot Cyber Attack Cyber Crime Cybersecurity Data Breaches Salesforce ShinyHunters Udemy Zara3 Min Read April 27, 2026 ShinyHunters Leaks Data of Udemy, Zara, 7-Eleven in Salesforce Linked Breach A series of new data leak listings posted on a dark web site linked to the ShinyHunters hacker group has put three well-known companies in the…
Security2 Min Read April 27, 2026 FTC: Americans lost over $2.1 billion to social media scams in 2025 The U.S. Federal Trade Commission (FTC) warned of a massive increase in losses from social media scams since 2020, exceeding $2.1 billion in…
DDoS Vulnerabilities2 Min Read April 27, 2026 Notepad++ Vulnerability Allows Attackers to Crash Application, Leak Memory Data A security vulnerability has been identified in Notepad++, one of the most widely used open-source text editors among developers and IT…
Security2 Min Read April 27, 2026 PyPI package with 1.1M monthly downloads hacked to push infostealer An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive developer data…
Social Engineering2 Min Read April 27, 2026 US Sanctions Target Cambodian Scam Network Leaders A Cambodian network accused of orchestrating large-scale cryptocurrency fraud has been hit with US sanctions targeting senior figures and…
APT Groups Exploits Vulnerabilities Windows2 Min Read April 27, 2026 The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit Conceptual flow of the original CVE-2026-21510 exploitation | Image: Akamai Researchers at Akamai have discovered that a previous fix for a…
Security2 Min Read April 27, 2026 Home security giant ADT data breach affects 5.5 million people The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant…
Exploits Network Ransomware Vulnerabilities3 Min Read April 27, 2026 The CVE Watchtower: Weekly Threat Intelligence Briefing (April 20 – April 26, 2026) Welcome to your Monday morning digest. As we close out the final full week of April, the global threat landscape is painting a complex…
Data Breach Malware Supply Chain2 Min Read April 27, 2026 Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group…
Ransomware2 Min Read April 27, 2026 Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected Itron, a global technology provider for the utilities industry, has disclosed it suffered a cybersecurity breach. In an 8-K form filed to the…