Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Malware Threat Intelligence3 Min Read May 1, 2026 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails…
Malware Social Engineering2 Min Read May 1, 2026 Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the…
Malware Supply Chain Attack2 Min Read May 1, 2026 Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Malware Supply Chain Attack3 Min Read April 30, 2026 PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…
Malware Supply Chain Attack3 Min Read April 29, 2026 SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with…
Malware Social Engineering7 Min Read April 29, 2026 New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by…
Malware Supply Chain Attack4 Min Read April 28, 2026 Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players…
Malware Supply Chain Attack4 Min Read April 28, 2026 VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw…
Linux Malware Ransomware Vulnerabilities5 Min Read April 28, 2026 FIRESTARTER: Cisco ASA Backdoor The Advisory That Changes EverythingOn April 23, 2026, CISA and the United Kingdom National Cyber Security Centre jointly assessed that…
Data Breach Malware Supply Chain2 Min Read April 27, 2026 Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group…
Cyber Attack Cybersecurity Google Malware Mandiant Microsoft Security Snow UNC6692 Windoes2 Min Read April 27, 2026 UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware A data theft campaign by a relatively new hacking group, UNC6692, has been discovered, in which hackers use social engineering and a custom…
Malware Software Supply Chain2 Min Read April 27, 2026 Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked…
Captcha Cyber Attack Cybersecurity Infostealer JPEG Malware Security Vidar Windows3 Min Read April 27, 2026 Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files New research from the Lat61 Threat Intelligence Team at Point Wild reveals that hackers are now hiding malicious code inside everyday files…
Linux Malware Nation-state Windows2 Min Read April 27, 2026 Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet Security researchers have identified malware dating back to 2005 that appears to have been designed to disrupt Iran’s nuclear program…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read April 27, 2026 Attackers Can Backdoor CODESYS Applications by Chaining Vulnerabilities Multiple vulnerabilities in the CODESYS Control runtime, one of the world’s most widely adopted software-based programmable logic…
Malware Network Phishing Ransomware2 Min Read April 27, 2026 BlackFile Group Targets Retail and Hospitality with Vishing Attacks Security researchers have revealed details of a new extortion group that has been actively targeting retail and hospitality businesses since…
Malware Ransomware Vulnerabilities2 Min Read April 27, 2026 Critical 9.8 CVSS RCE Hijacks Pipecat Voice Agents A critical has been disclosed in Pipecat, the popular open-source Python framework used to build voice and conversational agents. The flaw,…
Malware Phishing Ransomware Vulnerabilities3 Min Read April 26, 2026 CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new…
Malware Nation-state Network Vulnerabilities2 Min Read April 25, 2026 Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized…
Captcha ClickFix Cyber Attack Cybersecurity Fraud Malware Scam Scams and Fraud Security Windows3 Min Read April 24, 2026 New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk A new ClickFix attack campaign uses fake CAPTCHA pages to trick users into running malicious commands. Learn how hackers use cmdkey and…
Malware Network Ransomware Vulnerabilities2 Min Read April 24, 2026 Governments on high alert after CISA snuffs out Firestarter backdoor on fed network A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and…
Bitwarden Cyber Attack Cyber Attacks Cyber Crime Cybersecurity Developer Malware NPM Password manager Security TeamPCP3 Min Read April 24, 2026 TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware On April 20, 2026, at around 5:00 pm CET, the coding world was alerted after a widely used tool called @bitwarden/cli was found to be…
Cryptocurrency Malware3 Min Read April 24, 2026 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an…
Malware Threat Intelligence2 Min Read April 24, 2026 Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2…
Botnets Malware Ransomware Supply Chain2 Min Read April 24, 2026 Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation Malicious npm packages have been identified distributing malware that steals credentials and attempts to spread across developer ecosystems.…
Cloud Security Malware4 Min Read April 23, 2026 UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams…
Afghanistan Carbon Black Cyber Attack Cyber Attacks Cybersecurity GoGra Harvester APT India Linux Malware Security Symantec3 Min Read April 23, 2026 Harvester APT Expands Spying Operations with New GoGra Linux Malware A nation-state-backed Advanced Persistent Threat (APT) group identified as Harvester has, reportedly, developed a new, malicious backdoor…
Data Breach Malware Phishing Ransomware2 Min Read April 23, 2026 Cyber-Attacks Surge 63% Annually in Education Sector Schools and universities across the globe experienced a sharp increase in attacks last year thanks to the combined threat from…
Malware Threat Intelligence2 Min Read April 23, 2026 China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT)…
Apple Malware Network Windows2 Min Read April 22, 2026 MacOS Native Tools Enable Stealthy Enterprise Attacks A growing range of native macOS features are being repurposed by attackers to execute code, move laterally and evade detection, according to…
Exploits Malware Phishing Ransomware2 Min Read April 22, 2026 Surge in Silent Subject Phishing Attacks Targets VIP Users A surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high-value users. According to…
Malware Network Ransomware Supply Chain5 Min Read April 16, 2026 The case for dependency cooldowns in a post-axios world Application security has reached a crossroads between velocity and security. In the past, teams focused on the risks of outdated dependencies,…
Malware Social Engineering2 Min Read April 1, 2026 Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files.…
Malware Windows Security3 Min Read April 1, 2026 Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows…
Malware Network Phishing Ransomware5 Min Read March 31, 2026 The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities…
Encryption Malware4 Min Read March 31, 2026 Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Cybersecurity Malware5 Min Read March 27, 2026 TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by…
Malware Ransomware2 Min Read March 27, 2026 AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign,…
Malware Mobile Security3 Min Read March 26, 2026 Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version…
Malware Web Security3 Min Read March 26, 2026 WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate…