Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public…
Endpoint Security Software Security3 Min Read May 5, 2026 DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according…
Endpoint Security Network Security3 Min Read May 5, 2026 China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South…
Cyber Espionage Surveillance3 Min Read May 5, 2026 ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage…
Network Security Vulnerability4 Min Read May 1, 2026 China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across…
Cybersecurity News Hacking News14 Min Read April 30, 2026 ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
Cloud Security Threat Intelligence3 Min Read April 30, 2026 New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities…
Enterprise Security Threat Intelligence16 Min Read April 30, 2026 EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation…
Vulnerability Web Hosting4 Min Read April 29, 2026 Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain…
Linux Malware Ransomware Vulnerabilities5 Min Read April 28, 2026 FIRESTARTER: Cisco ASA Backdoor The Advisory That Changes EverythingOn April 23, 2026, CISA and the United Kingdom National Cyber Security Centre jointly assessed that…
Cybersecurity Hacking10 Min Read April 27, 2026 ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains…
Cyber Attack Cybersecurity Google Malware Mandiant Microsoft Security Snow UNC6692 Windoes2 Min Read April 27, 2026 UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware A data theft campaign by a relatively new hacking group, UNC6692, has been discovered, in which hackers use social engineering and a custom…
Hacktivism Vulnerability5 Min Read April 27, 2026 PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read April 27, 2026 Attackers Can Backdoor CODESYS Applications by Chaining Vulnerabilities Multiple vulnerabilities in the CODESYS Control runtime, one of the world’s most widely adopted software-based programmable logic…
Malware Phishing Ransomware Vulnerabilities3 Min Read April 26, 2026 CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new…
Security2 Min Read April 25, 2026 Threat actor uses Microsoft Teams to deploy new “Snow” malware A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named “Snow,” which includes a…
Malware Nation-state Network Vulnerabilities2 Min Read April 25, 2026 Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized…
Security3 Min Read April 24, 2026 Firestarter malware survives Cisco firewall updates, security patches Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure…
Network Security Vulnerability5 Min Read April 24, 2026 FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device…
Malware Network Ransomware Vulnerabilities2 Min Read April 24, 2026 Governments on high alert after CISA snuffs out Firestarter backdoor on fed network A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and…
Malware Threat Intelligence2 Min Read April 24, 2026 Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2…
Cloud Security Malware4 Min Read April 23, 2026 UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams…
Afghanistan Carbon Black Cyber Attack Cyber Attacks Cybersecurity GoGra Harvester APT India Linux Malware Security Symantec3 Min Read April 23, 2026 Harvester APT Expands Spying Operations with New GoGra Linux Malware A nation-state-backed Advanced Persistent Threat (APT) group identified as Harvester has, reportedly, developed a new, malicious backdoor…
Cybersecurity News Hacking News15 Min Read April 23, 2026 ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small…
Artificial Intelligence Exposure Management6 Min Read April 23, 2026 Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them? Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the…
Malware Threat Intelligence2 Min Read April 23, 2026 China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT)…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Email Security Mobile Security3 Min Read March 28, 2026 TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed…
Cyber Espionage Network Security3 Min Read March 26, 2026 China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against…
Cybersecurity Hacking News15 Min Read March 26, 2026 ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories Some weeks in security feel loud. This one feels sneaky. Less big dramatic fireworks, more of that slow creeping sense that too many people…
Cybercrime Ransomware2 Min Read March 25, 2026 Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to…
Cloud Security Malware Network Ransomware10 Min Read March 24, 2026 LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign Key points and observations On March 24, 2026, two PyPI releases of LiteLLM, 1.82.7 and 1.82.8, were published with malicious code as a result…
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Malware Threat Intelligence4 Min Read March 21, 2026 Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that…
Cyber Espionage Threat Intelligence2 Min Read March 19, 2026 Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program…
Cybersecurity Hacking News10 Min Read March 19, 2026 ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once.…
Cyber Espionage Vulnerability6 Min Read March 19, 2026 DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least…
Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Malvertising Threat Intelligence6 Min Read March 16, 2026 ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called…
Cyber Espionage Endpoint Security3 Min Read March 16, 2026 DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report…
Cyber Espionage Military Security3 Min Read March 13, 2026 Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign…