CYBERSECURITY

Axios Supply Chain Attack Sends Cross-Platform RAT Through Hacked npm Account

Axios Supply Chain Attack Sends Cross-Platform RAT Through Hacked npm Account

There has been a supply chain attack on Axios, a popular HTTP client This article explores node js malware. . Two new versions of the npm package added a.

DeepLoad malware that uses AI steals credentials and hides from detection.

DeepLoad malware that uses AI steals credentials and hides from detection.

Researchers have found a new type of malware that can steal credentials as soon as it gets onto a victim's network This article explores reliquest looked.

Manufacturing and Healthcare Both Have Problems with Passwords

Manufacturing and Healthcare Both Have Problems with Passwords

For four years in a row, ransomware groups went after manufacturing the most This article explores passwords safe uses. . Both have environments full of.

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

A flaw in OpenAI ChatGPT that had never been found before let sensitive conversation data be stolen without the user's knowledge or permission This.

Uses of DeepLoad Malware Stealing Browser Credentials with ClickFix and WMI Persistence

Uses of DeepLoad Malware Stealing Browser Credentials with ClickFix and WMI Persistence

Discover how A new campaign has used the ClickFix social engineering trick to spread a malware loader that had not been seen before. The loader, on the.

⚡ Weekly Roundup: Telecom sleeper cells, LLM jailbreaks, Apple makes U.K. age checks mandatory, and more

⚡ Weekly Roundup: Telecom sleeper cells, LLM jailbreaks, Apple makes U.K. age checks mandatory, and more

People are actively taking advantage of a serious security hole in Citrix NetScaler This article explores risks national cyber. . The FBI said that.

Three SOC process fixes that boost Tier 1 productivity

Three SOC process fixes that boost Tier 1 productivity

In a lot of SOCs, the threat isn't the only thing that causes the most delays This article explores soc threat visibility. . They happen because of broken.

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

Secrets sprawl isn't slowing down: in 2025, it sped up faster than most security teams thought it would This article explores secrets gitguardian sprawl.

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Discover how Researchers at Censys have found a remote access toolkit that came from Russia. Malicious Windows shortcut (LNK) files that look like private.

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three groups of threat actors linked to China have gone after a government agency in Southeast Asia This article explores clusters threat group. . HIUPAN.

Hackers with ties to Iran break into the FBI directors personal email and hit Stryker with a wiper attack.

Hackers with ties to Iran break into the FBI directors personal email and hit Stryker with a wiper attack.

Discover how Iran's Ministry of Intelligence and Security is thought to have created the hacktivist persona Handala Hack, which is pro-Iranian and.

Citrix NetScaler is currently being looked at for CVE-2026-3055 (CVSS 9.3). Bug that reads too much memory

Citrix NetScaler is currently being looked at for CVE-2026-3055 (CVSS 9.3). Bug that reads too much memory

Citrix NetScaler ADC and Gateway versions 14.1 and 13.1 are both vulnerable. The vulnerability, CVE-2026-3055, is a case of not checking input properly.

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

A Russian government-backed threat group is using the DarkSword exploit kit to attack iOS devices. The group is known for spear-phishing campaigns that.

CISA adds CVE-2025-53521 to the list of known vulnerabilities (KEV). After using Active F5 BIG-IP APM

CISA adds CVE-2025-53521 to the list of known vulnerabilities (KEV). After using Active F5 BIG-IP APM

The U.S This article explores vulnerabilities kev cve. . Cybersecurity and Infrastructure Security Agency (CISA) added a serious security hole to its list.

Coruna, DarkSword, and Democratizing Nation-State Exploit Kits

Coruna, DarkSword, and Democratizing Nation-State Exploit Kits

Coruna is a high-quality mobile exploit kit that has zero-day vulnerabilities for high-level spying This article explores darksword tier ios. . It turns.

Apple Sends Lock Screen Alerts to Old iPhones About Active Web-Based Exploits

Apple Sends Lock Screen Alerts to Old iPhones About Active Web-Based Exploits

Apple is now sending Lock Screen notifications to iPhones and iPads that are running older versions of iOS and iPadOS. The alerts let people know about.

Wartime Usage of Compromised IP Cameras Highlight Their Danger

Wartime Usage of Compromised IP Cameras Highlight Their Danger

Reports say that Israel and the US took over Iran's network of traffic cameras to keep an eye on the movements of Iranian leader Ayatollah Ali Khamenei.

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

TeamPCP has made the telnyx Python package less secure by releasing two bad versions of it This article explores teampcp telnyx python. . The malware is.

China improves the backdoor it uses to spy on telecom companies around the world.

China improves the backdoor it uses to spy on telecom companies around the world.

People in China have been messing with a cutting-edge backdoor called "BPFdoor." Before it was updated, BPFdoor was already one of the most advanced.

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

Discover how Researchers have shared information about a bug that has now been fixed that affected Open VSX's pre-publish scanning pipeline. The bug let a.

Attacks on infrastructure that have physical effects are down 25%.

Attacks on infrastructure that have physical effects are down 25%.

For the first time in seven years, the number of major operational technology (OT) cyber incidents went down in 2025 This article explores think.

How mistakes can help businesses improve their security programs

How mistakes can help businesses improve their security programs

Ports that are open to the Internet, weak or reused passwords, and bad patching habits are some of the most common security holes that let hackers steal.

We Are At War

We Are At War

Discover how Cyber operations are a sign of rising geopolitical tensions, or in some cases, they happen before they do. In geopolitical conflict, all.

AitM phishing attacks on TikTok business accounts use Cloudflare Turnstile Evasion.

AitM phishing attacks on TikTok business accounts use Cloudflare Turnstile Evasion.

Threat actors are using adversary-in-the-middle (AitM) phishing pages to take over TikTok for Business accounts This article explores malicious svgs used.

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

LangChain and LangGraph are free and open-source frameworks that help developers make apps that use Large Language Models (LLMs) This article explores.

Is the FCC's Router Ban the Wrong Fix?

Is the FCC's Router Ban the Wrong Fix?

The FCC has stopped people from bringing in new consumer-grade routers made by companies outside the US This article explores routers americans use. . The.

Cybersecurity threats to cars are growing as more cars become connected and self-driving.

Cybersecurity threats to cars are growing as more cars become connected and self-driving.

Two researchers showed that they could take control of a Jeep Cherokee from a distance This article explores hack jeep cherokee. . Chrysler, Jeep's parent.

Red Menshen, which is linked to China, uses stealthy BPFDoor implants to spy on telecom networks.

Red Menshen, which is linked to China, uses stealthy BPFDoor implants to spy on telecom networks.

Red Menshen is the name of the threat cluster that is responsible for the campaign This article explores menshen threat cluster. . It is also known as.

How mistakes can help organizations improve their security programs

How mistakes can help organizations improve their security programs

Weak or reused passwords, ports that are open to the Internet, and bad patching are some of the most common problems that lead to data breaches This.

Top 5 this week

Page 3 of 21