Malware Supply Chain Attack2 Min Read May 1, 2026 Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Malware Supply Chain Attack3 Min Read April 30, 2026 PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…
Cybersecurity News Hacking News14 Min Read April 30, 2026 ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
Enterprise Security Threat Intelligence16 Min Read April 30, 2026 EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation…
AI Security Vulnerability4 Min Read April 30, 2026 Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the…
Malware Supply Chain Attack3 Min Read April 29, 2026 SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with…
Malware Social Engineering7 Min Read April 29, 2026 New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by…
Cloud Security Vulnerability3 Min Read April 29, 2026 LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
Software Security Vulnerability3 Min Read April 28, 2026 Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that…
Malware Supply Chain Attack4 Min Read April 28, 2026 Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players…
Network Security Vulnerability2 Min Read April 28, 2026 Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform…
Security2 Min Read April 27, 2026 GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update. Six…
DDoS Vulnerabilities2 Min Read April 27, 2026 Notepad++ Vulnerability Allows Attackers to Crash Application, Leak Memory Data A security vulnerability has been identified in Notepad++, one of the most widely used open-source text editors among developers and IT…
Security2 Min Read April 27, 2026 PyPI package with 1.1M monthly downloads hacked to push infostealer An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive developer data…
Data Breach Malware Supply Chain2 Min Read April 27, 2026 Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group…
Cybersecurity Hacking10 Min Read April 27, 2026 ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains…
Malware Software Supply Chain2 Min Read April 27, 2026 Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked…
Captcha Cyber Attack Cybersecurity Infostealer JPEG Malware Security Vidar Windows3 Min Read April 27, 2026 Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files New research from the Lat61 Threat Intelligence Team at Point Wild reveals that hackers are now hiding malicious code inside everyday files…
Captcha ClickFix Cyber Attack Cybersecurity Fraud Malware Scam Scams and Fraud Security Windows3 Min Read April 24, 2026 New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk A new ClickFix attack campaign uses fake CAPTCHA pages to trick users into running malicious commands. Learn how hackers use cmdkey and…
Bitwarden Cyber Attack Cyber Attacks Cyber Crime Cybersecurity Developer Malware NPM Password manager Security TeamPCP3 Min Read April 24, 2026 TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware On April 20, 2026, at around 5:00 pm CET, the coding world was alerted after a widely used tool called @bitwarden/cli was found to be…
Apple Linux Vulnerabilities Windows2 Min Read April 24, 2026 Python Vulnerability Allows Out-of-Bounds Write on Windows Systems A security vulnerability has been discovered in Python’s Windows asyncio implementation, allowing attackers to trigger out-of-bounds…
Malware Threat Intelligence2 Min Read April 24, 2026 Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2…
Network Security Vulnerability3 Min Read April 24, 2026 LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active…
Open Source Supply Chain Attack4 Min Read April 23, 2026 Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from…
Cybersecurity News Hacking News15 Min Read April 23, 2026 ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small…
Artificial Intelligence Claude Code Copilot Cyber Attack Cybersecurity GitHub GitHub Copilot Indirect Prompt Injection IPI Security Vulnerability3 Min Read April 23, 2026 Hackers Use Hidden Website Instructions in New Attacks on AI Assistants Threat actors are now using a method called Indirect Prompt Injection (IPI) to trick Large Language Models (LLMs) by hiding secret commands on…
DDoS Ransomware3 Min Read April 23, 2026 Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents Security researchers have discovered 10 new indirect prompt injection (IPI) payloads targeting AI agents with malicious instructions designed…
Malware Network Ransomware Supply Chain5 Min Read April 16, 2026 The case for dependency cooldowns in a post-axios world Application security has reached a crossroads between velocity and security. In the past, teams focused on the risks of outdated dependencies,…
Open Source Supply Chain Attack5 Min Read March 31, 2026 Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Email Security Mobile Security3 Min Read March 28, 2026 TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed…
Cybersecurity Hacking News15 Min Read March 26, 2026 ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories Some weeks in security feel loud. This one feels sneaky. Less big dramatic fireworks, more of that slow creeping sense that too many people…
Malware Mobile Security3 Min Read March 26, 2026 Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version…
Browser Security Threat Intelligence4 Min Read March 25, 2026 GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of…
Artificial Intelligence SaaS Security5 Min Read March 25, 2026 The Kill Chain Is Obsolete When Your AI Agent Is the Threat In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage…
Cryptocurrency Supply Chain Attack4 Min Read March 24, 2026 Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive…
DevSecOps Vulnerability4 Min Read March 24, 2026 TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP,…
Cloud Security Malware Network Ransomware10 Min Read March 24, 2026 LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign Key points and observations On March 24, 2026, two PyPI releases of LiteLLM, 1.82.7 and 1.82.8, were published with malicious code as a result…
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Cloud Security DevSecOps4 Min Read March 20, 2026 Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to…
Cybersecurity Hacking News10 Min Read March 19, 2026 ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once.…