Supply Chain Attack Web Security5 Min Read March 18, 2026 Claude Code Security and Magecart: Getting the Threat Model Right When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it –…
Network Security Vulnerability3 Min Read March 18, 2026 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which…
Cryptocurrency Malware3 Min Read March 16, 2026 GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds…
Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Malware Threat Intelligence4 Min Read March 14, 2026 GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it…
Enterprise Security Regulatory Compliance4 Min Read March 11, 2026 What Boards Must Demand in the Age of AI-Automated Exploitation “You knew, and you could have acted. Why didn’t you?” This is the question you do not want to be asked. And…
Endpoint Security Security Operations2 Min Read March 9, 2026 Can the Security Platform Finally Deliver for the Mid-Market? Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of…
Browser Security Threat Intelligence5 Min Read March 9, 2026 Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push…
Cybersecurity Hacking News10 Min Read March 5, 2026 ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how…
Artificial Intelligence Enterprise Security5 Min Read February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a…
Artificial Intelligence National Security3 Min Read February 28, 2026 Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI)…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Cybersecurity Hacking15 Min Read February 23, 2026 ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the…
AI Security DevOps4 Min Read February 23, 2026 Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster…
Artificial Intelligence Training3 Min Read February 21, 2026 EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4…
Artificial Intelligence Software Security4 Min Read February 20, 2026 Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to…
Cybersecurity Hacking News15 Min Read February 19, 2026 ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up…
Artificial Intelligence DevSecOps4 Min Read February 19, 2026 From Exposure to Exploitation: How AI Collapses Your Response Window We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving.…
Data Security Zero Trust7 Min Read February 18, 2026 Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted…
Data Breach Phishing Ransomware Vulnerabilities13 Min Read February 16, 2026 Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons,…
Critical Infrastructure Malware4 Min Read February 13, 2026 Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights…
DevSecOps Supply Chain Security4 Min Read February 13, 2026 npm’s Update to Harden Their Supply Chain, and Points to Consider In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain…
Threat Intelligence Vulnerability5 Min Read February 13, 2026 Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged…
Cybersecurity Hacking News18 Min Read February 12, 2026 ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new…
Cybersecurity Hacking News11 Min Read February 9, 2026 ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems…
Developer Security Malware4 Min Read February 6, 2026 Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI)…
Cybersecurity Hacking News11 Min Read February 5, 2026 ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look…
Endpoint Security Threat Intelligence3 Min Read February 2, 2026 eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been…
Developer Tools Malware3 Min Read February 2, 2026 Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Data Breach Software Security3 Min Read December 31, 2025 Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was…
Cybersecurity Malware3 Min Read December 31, 2025 Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
Cybersecurity Hacking News17 Min Read December 29, 2025 ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
Artificial Intelligence Cloud Security7 Min Read December 29, 2025 Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for…
Endpoint Security Threat Intelligence,4 Min Read December 26, 2025 China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary…
Browser Security Enterprise Security3 Min Read December 23, 2025 Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that…
Malware Open Source3 Min Read December 22, 2025 Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp…
Software Security Vulnerability2 Min Read December 18, 2025 CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known…
Cryptocurrency Cybersecurity2 Min Read December 16, 2025 Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and…
Cloud Security Vulnerability3 Min Read December 16, 2025 Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical…