Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensur…
3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that… Endpoint Security Threat Intelligence
2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical… Network Security Vulnerability
2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to… Server Security Vulnerability
Encryption Vulnerability2 Min Read April 23, 2026 Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion…
Anthropic Artificial Intelligence Claude Claude Mythos Preview Cyber Attack Cyber Crime Data Breaches Discord Mythos AI Project Glasswing Security4 Min Read April 22, 2026 Discord-Linked Group Accessed Anthropic’s Claude Mythos AI in Vendor Breach Two weeks after Anthropic announced Claude Mythos Preview (aka Claude Mythos and Mythos AI) as part of its Project Glasswing initiative, the…
Apple Malware Network Windows2 Min Read April 22, 2026 MacOS Native Tools Enable Stealthy Enterprise Attacks A growing range of native macOS features are being repurposed by attackers to execute code, move laterally and evade detection, according to…
Uncategorized2 Min Read April 22, 2026 NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks The UK National Cyber Security Centre (NCSC) has unveiled a new technology designed to protect video connections from cyber-attacks. The…
Uncategorized2 Min Read April 22, 2026 UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’ The UK government has announced a £90m ($120m) injection into cybersecurity aiming to strengthen the nation’s cyber…
Exploits Malware Phishing Ransomware2 Min Read April 22, 2026 Surge in Silent Subject Phishing Attacks Targets VIP Users A surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high-value users. According to…
Ransomware2 Min Read April 22, 2026 Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang A former ransomware negotiator has pleaded guilty to secretly working with the BlackCat ransomware group and consipring to launch attacks…
Malware Network Ransomware Supply Chain5 Min Read April 16, 2026 The case for dependency cooldowns in a post-axios world Application security has reached a crossroads between velocity and security. In the past, teams focused on the risks of outdated dependencies,…
Cloud Security Exploits Ransomware Vulnerabilities4 Min Read April 9, 2026 Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8562 In the previous post, we continued our series on the unpatchable vulnerabilities of Kubernetes, examining how CVE-2020-8561 combined multiple…
Malware Social Engineering2 Min Read April 1, 2026 Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files.…
Data Protection Endpoint Security4 Min Read April 1, 2026 Block the Prompt, Not the Work: The End of "Doctor No" There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build.…
Malware Windows Security3 Min Read April 1, 2026 Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows…
Browser Security Vulnerability2 Min Read April 1, 2026 New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said…
Artificial Intelligence Threat Detection3 Min Read April 1, 2026 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming) For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next.…
AI Security Cloud Security3 Min Read March 31, 2026 Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence…
Malware Network Phishing Ransomware5 Min Read March 31, 2026 The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities…
Encryption Malware4 Min Read March 31, 2026 Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a…
Open Source Supply Chain Attack5 Min Read March 31, 2026 Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Digital Forensics Endpoint Security5 Min Read March 30, 2026 3 SOC Process Fixes That Unlock Tier 1 Productivity What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat…
Critical Infrastructure Hacktivism6 Min Read March 28, 2026 Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of…
Network Security Vulnerability2 Min Read March 28, 2026 Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity,…
Network Security Vulnerability3 Min Read March 28, 2026 CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy…
Email Security Mobile Security3 Min Read March 28, 2026 TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed…
Mobile Security Spyware2 Min Read March 27, 2026 Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based…
Cybersecurity Malware5 Min Read March 27, 2026 TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by…
DevSecOps Software Security2 Min Read March 27, 2026 Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's pre-publish scanning pipeline to cause the tool to…
Malware Ransomware2 Min Read March 27, 2026 AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign,…
Hacktivism Threat Intelligence10 Min Read March 27, 2026 We Are At War Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized.…
Threat Intelligence Vulnerability2 Min Read March 27, 2026 Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in…
Artificial Intelligence Vulnerability2 Min Read March 27, 2026 LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited,…
Cyber Espionage Network Security3 Min Read March 26, 2026 China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against…
Security Automation Security Testing1 Min Read March 26, 2026 [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything…
Browser Security Vulnerability2 Min Read March 26, 2026 Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to…
Artificial Intelligence Threat Detection6 Min Read March 26, 2026 Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can…
Cybersecurity Hacking News15 Min Read March 26, 2026 ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories Some weeks in security feel loud. This one feels sneaky. Less big dramatic fireworks, more of that slow creeping sense that too many people…
Malware Mobile Security3 Min Read March 26, 2026 Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version…
Malware Web Security3 Min Read March 26, 2026 WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate…
Cybercrime Dark Web2 Min Read March 25, 2026 LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported…
Browser Security Threat Intelligence4 Min Read March 25, 2026 GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of…
Artificial Intelligence SaaS Security5 Min Read March 25, 2026 The Kill Chain Is Obsolete When Your AI Agent Is the Threat In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage…