DevSecOps Vulnerability4 Min Read March 24, 2026 TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP,…
Cloud Security Malware Network Ransomware10 Min Read March 24, 2026 LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign Key points and observations On March 24, 2026, two PyPI releases of LiteLLM, 1.82.7 and 1.82.8, were published with malicious code as a result…
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Cloud Security Email Security5 Min Read March 23, 2026 Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver…
Malware Threat Intelligence4 Min Read March 21, 2026 Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that…
Cloud Security DevSecOps4 Min Read March 20, 2026 Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to…
Artificial Intelligence Vulnerability4 Min Read March 20, 2026 Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at…
Artificial Intelligence Data Protection4 Min Read March 20, 2026 The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out…
Cybersecurity Hacking News10 Min Read March 19, 2026 ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once.…
Malware Mobile Security3 Min Read March 19, 2026 New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim…
March 18, 2026 Windsurf IDE Extension Drops Malware via Solana Blockchain Bitdefender researchers have discovered a malicious Windsurf IDE (integrated development environment) extension that deploys a multi-stage…
Supply Chain Attack Web Security5 Min Read March 18, 2026 Claude Code Security and Magecart: Getting the Threat Model Right When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it –…
Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Cyber Espionage Military Security3 Min Read March 13, 2026 Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign…
Malware VPN Security2 Min Read March 13, 2026 Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through…
Linux Vulnerability2 Min Read March 13, 2026 Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited…
Cybercrime Malware3 Min Read March 12, 2026 Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a…
Malware Analysis Threat Intelligence7 Min Read March 12, 2026 How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern…
Application Security Vulnerability3 Min Read March 11, 2026 Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two…
Cyber Espionage Threat Intelligence3 Min Read March 10, 2026 APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to…
Cybersecurity Hacking20 Min Read March 9, 2026 ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were busy. Defenders were busy. And somewhere in the…
Scam Research14 Min Read March 9, 2026 Global Scam Machines: Inside a Meta-Powered Investment Fraud Ecosystem Spanning 25 Countries In February-March 2026, Bitdefender Labs identified and mapped a sprawling global scam infrastructure and scalable disinformation-for-profit…
Browser Security Threat Intelligence5 Min Read March 9, 2026 Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push…
Cloud Security Phishing Ransomware Vulnerabilities5 Min Read March 9, 2026 Behind the console: Active phishing campaign targeting AWS console credentials Key points and observations Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS…
Cloud Security Cyber Warfare5 Min Read March 6, 2026 Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself…
Active Directory Windows Security5 Min Read March 5, 2026 Where Multi-Factor Authentication Stops and Credential Abuse Starts Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In…
Artificial Intelligence Enterprise Security5 Min Read February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Endpoint Security Windows Security2 Min Read February 27, 2026 Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to…
February 27, 2026 Hook, line, and vault: A technical deep dive into the 1Phish kit Key points and observations The 1Phish kit evolved between September 2025 and February 2026 from a basic credential harvester into an…
Cybersecurity Hacking News10 Min Read February 26, 2026 ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an…
Malware Supply Chain Attack5 Min Read February 26, 2026 Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical…
Enterprise Security Identity Security5 Min Read February 24, 2026 Identity Prioritization isn't a Backlog Problem – It's a Risk Math Problem Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control…
Healthcare Threat Intelligence3 Min Read February 24, 2026 Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an…
Cybersecurity Hacking15 Min Read February 23, 2026 ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the…
Artificial Intelligence Zero Trust6 Min Read February 23, 2026 How Exposed Endpoints Increase Risk Across LLM Infrastructure As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming…
AI Security DevOps4 Min Read February 23, 2026 Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster…
Artificial Intelligence Threat Intelligence4 Min Read February 21, 2026 AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence…
Artificial Intelligence Training3 Min Read February 21, 2026 EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4…
Cyber Insurance Password Security4 Min Read February 20, 2026 Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026 With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on…
Cybersecurity Hacking News15 Min Read February 19, 2026 ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up…
Artificial Intelligence DevSecOps4 Min Read February 19, 2026 From Exposure to Exploitation: How AI Collapses Your Response Window We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving.…