Endpoint Security Threat Intelligence3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous…
API Security Artificial Intelligence4 Min Read May 5, 2026 We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption…
Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Financial Crime Mobile Security7 Min Read May 4, 2026 Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam…
Network Security Vulnerability4 Min Read May 1, 2026 China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across…
Malware Supply Chain Attack2 Min Read May 1, 2026 Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Malware Supply Chain Attack3 Min Read April 30, 2026 PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…
Cybersecurity News Hacking News14 Min Read April 30, 2026 ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
Cloud Security Threat Intelligence3 Min Read April 30, 2026 New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities…
Enterprise Security Threat Intelligence16 Min Read April 30, 2026 EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation…
Malware Supply Chain Attack3 Min Read April 29, 2026 SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with…
Malware Social Engineering7 Min Read April 29, 2026 New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by…
Cloud Security Vulnerability3 Min Read April 29, 2026 LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
Malware Supply Chain Attack4 Min Read April 28, 2026 VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw…
Identity Management Vulnerability2 Min Read April 28, 2026 Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity…
Threat Intelligence Vulnerability3 Min Read April 28, 2026 Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has…
APT Groups Exploits Vulnerabilities Windows2 Min Read April 27, 2026 The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit Conceptual flow of the original CVE-2026-21510 exploitation | Image: Akamai Researchers at Akamai have discovered that a previous fix for a…
Data Breach Malware Supply Chain2 Min Read April 27, 2026 Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group…
Cybersecurity Hacking10 Min Read April 27, 2026 ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains…
Cyber Attack Cybersecurity Google Malware Mandiant Microsoft Security Snow UNC6692 Windoes2 Min Read April 27, 2026 UNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware A data theft campaign by a relatively new hacking group, UNC6692, has been discovered, in which hackers use social engineering and a custom…
Hacktivism Vulnerability5 Min Read April 27, 2026 PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video…
Malware Network Phishing Ransomware2 Min Read April 27, 2026 BlackFile Group Targets Retail and Hospitality with Vishing Attacks Security researchers have revealed details of a new extortion group that has been actively targeting retail and hospitality businesses since…
Agentic AI AI Cyber Attack Cybersecurity Identity theft Microsoft Microsoft Entra Security Silverfort Vulnerability2 Min Read April 26, 2026 Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation Cybersecurity researchers at the identity protection firm Silverfort found a vulnerability in a Microsoft platform built to manage AI. The…
Malware Phishing Ransomware Vulnerabilities3 Min Read April 26, 2026 CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new…
Security2 Min Read April 25, 2026 Threat actor uses Microsoft Teams to deploy new “Snow” malware A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named “Snow,” which includes a…
Microsoft Security3 Min Read April 24, 2026 Microsoft to roll out Entra passkeys on Windows in late April Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected resources from…
Bitwarden Cyber Attack Cyber Attacks Cyber Crime Cybersecurity Developer Malware NPM Password manager Security TeamPCP3 Min Read April 24, 2026 TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware On April 20, 2026, at around 5:00 pm CET, the coding world was alerted after a widely used tool called @bitwarden/cli was found to be…
Open Source Supply Chain Attack4 Min Read April 23, 2026 Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from…
Cybersecurity News Hacking News15 Min Read April 23, 2026 ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small…
Artificial Intelligence Exposure Management6 Min Read April 23, 2026 Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them? Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the…
Exploits Malware Phishing Ransomware2 Min Read April 22, 2026 Surge in Silent Subject Phishing Attacks Targets VIP Users A surge in phishing emails lacking subject lines has been identified as part of a widespread campaign targeting high-value users. According to…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Email Security Mobile Security3 Min Read March 28, 2026 TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed…
Cybersecurity Malware5 Min Read March 27, 2026 TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by…
Malware Ransomware2 Min Read March 27, 2026 AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign,…
Hacktivism Threat Intelligence10 Min Read March 27, 2026 We Are At War Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized.…
Cyber Espionage Network Security3 Min Read March 26, 2026 China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against…
Artificial Intelligence Threat Detection6 Min Read March 26, 2026 Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can…
Cybersecurity Hacking News15 Min Read March 26, 2026 ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories Some weeks in security feel loud. This one feels sneaky. Less big dramatic fireworks, more of that slow creeping sense that too many people…
Cybercrime Dark Web2 Min Read March 25, 2026 LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported…
Browser Security Threat Intelligence4 Min Read March 25, 2026 GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of…
Cryptocurrency Supply Chain Attack4 Min Read March 24, 2026 Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive…