Recent Blog Posts

Lorem Ipsum has been the industry's standard dummy text.

Showing posts from March, 2026Show all
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
We Are At War
LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
How Ceros Gives Security Teams Visibility and Control in Claude Code
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
Claude Code Security and Magecart: Getting the Threat Model Right
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds
Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
Why Security Validation Is Becoming Agentic
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure