access ai android api apple attack authentication backdoor breach business ceo china cisa cisco ciso cloud compliance control credentials crypto cve cyber cyberattack cybercrime cybersecurity data data-breach defense detection email exploit finance flaw framework fraud germany google governance government group hacker hacking healthcare identity infrastructure intelligence Internet jobs law leak linux malicious malware microsoft monitoring network open-source password phishing privacy ransomware remote-code-execution resilience risk russia scam service software strategy supply-chain technology theft threat tool unclassified update usa vulnerability windows zero-day
-
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team.”Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate…
-
Die Linke German political party confirms data stolen by Qilin ransomware
The Qilin ransomware group has claimed responsibility for an attack against Die Linke (‘The Left’), forcing an IT systems outage at the political party, and threatening sensitive data leak. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/ also interesting: Top 12 ways hackers broke into your systems in 2024 Ransomware Group Claims Attacks on Ascom,…
-
North Korean Hackers Abuse GitHub to Spy on South Korean Firms
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean… First seen on hackread.com Jump to article: hackread.com/north-korean-hackers-github-spy-south-korean-firms/ also interesting: North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts South Korea says DPRK hackers stole spy plane technical data Top 7 zero-day exploitation trends of…
-
Axios NPM supply chain incident
Tags: supply-chainOverview of the recent Axios NPM supply chain incident including details of the payloads delivered from actor-controlled infrastructure. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/axois-npm-supply-chain-incident/ also interesting: Cyber-Bedrohungen 2024: Trends und Ausblick PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist…
-
Do not get high(jacked) off your own supply (chain)
In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. Prominent examples include the malicious modification of Axios, a popular HTTP client library for JavaScript, as well as cascading compromises from TeamPCP, a “chaos-as-a-service” group that injected malicious code First seen on blog.talosintelligence.com Jump to article:…
-
Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’
Tags: electionThe Senate Democrat said that the SSA following Trump’s executive order would indicate “willing participation” in the administration’s midterm elections scheme. First seen on cyberscoop.com Jump to article: cyberscoop.com/wyden-warns-ssa-chief-trump-voter-database-blatant-voter-suppression/ also interesting: Disinfo group Spamouflage more aggressively targeting U.S. elections, candidates Digital Echo Chambers and Erosion of Trust Key Threats to the US Elections German intelligence…
-
Trump budget proposal would cut hundreds of millions more from CISA
Tags: cisaA top congressional Democrat criticized both the scope and nature of the proposed reduction. First seen on cyberscoop.com Jump to article: cyberscoop.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/ also interesting: U.S. CISA adds Microsoft Windows Kernel-Mode Driver and Adobe ColdFusion flaws to its Known Exploited Vulnerabilities catalog CISA and NSA share tips on securing Microsoft Exchange servers CISA warns of continued…
-
CERT-EU blames Trivy supply chain attack for Europa.eu data breach
Tags: access, ai, attack, breach, cisco, data, data-breach, extortion, group, network, ransom, ransomware, saas, supply-chainExtortion boost: The origins and deeper motives of TeamPCP, which emerged in late 2025, remain unclear. The leaking of stolen data suggests it might be styling itself as a sort of initial access broker which sells data and network access on to the highest bidder.However, the fact that stolen data was handed to a major…
-
CERT-EU blames Trivy supply chain attack for Europa.eu data breach
Tags: access, ai, attack, breach, cisco, data, data-breach, extortion, group, network, ransom, ransomware, saas, supply-chainExtortion boost: The origins and deeper motives of TeamPCP, which emerged in late 2025, remain unclear. The leaking of stolen data suggests it might be styling itself as a sort of initial access broker which sells data and network access on to the highest bidder.However, the fact that stolen data was handed to a major…
-
Claude Code is still vulnerable to an attack Anthropic has already fixed
This article first appeared on Infoworld. First seen on csoonline.com Jump to article: www.csoonline.com/article/4154201/claude-code-is-still-vulnerable-to-an-attack-anthropic-has-already-fixed-2.html also interesting: Japan warns of IO-Data zero-day router flaws exploited in attacks Cybersecurity Maturity and Why Your API Security is Lagging Behind FireTail Blog 2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 Don’t confuse asset inventory with exposure…
-
Internet Bug Bounty program hits pause on payouts
This article first appeared on InfoWorld. First seen on csoonline.com Jump to article: www.csoonline.com/article/4154216/internet-bug-bounty-program-hits-pause-on-payouts-2.html also interesting: Top 7 zero-day exploitation trends of 2024 Getting the Most Value Out of the OSCP: After the Exam Fighting AI with AI: Adversarial bots vs. autonomous threat hunters NDSS 2025 PropertyGPT
-
Blocking children from social media is a badly executed good idea
Tags: governmentGovernments are each inventing their own flavor of an age based ban for social media. Is the cure worse than the disease? First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/blocking-children-from-social-media-is-a-badly-executed-good-idea/ also interesting: UK Government Releases Cloud SCADA Security Guidance Haben die Russen die Wahl in Rumänien manipuliert? What is an encryption backdoor? Fake-ITler: Nordkoreanische IT-Agenten…
-
Meet Vespasian. It Sees What Static Analysis Can’t.
Praetorian is excited to announce the release of Vespasian, a probabilistic API endpoint discovery, enumeration, and analysis tool. Vespasian watches real HTTP traffic from a headless browser or your existing proxy captures and turns it into API specifications (OpenAPI, GraphQL SDL, WSDL). We built it because pentesters spend the first days of every API engagement……
-
Randall Munroe’s XKCD ‘Amperage’
Tags: datavia the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/04/randall-munroes-xkcd-amperage/ also interesting: Data breach hits Panda Restaurants Cyberattack prompts National Public Data bankruptcy filing Hackers accessed credit card data stored in Aultman Hospital’s gift shop OnePoint Patient Care data breach impacted 795916 individuals
-
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
As organizations disclose breaches tied to TeamPCP’s supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/teampcp-attacks-hacker-infighting also interesting: Oracle Cloud breach may impact 140,000 enterprise customers 6 hot cybersecurity trends 6 hot cybersecurity trends 6 ways hackers hide…
-
FBI Declares Surveillance System Breach a ‘Major Incident’
China-linked hackers breached an FBI surveillance system, exposing sensitive investigation data and prompting a “major incident” classification. The post FBI Declares Surveillance System Breach a ‘Major Incident’ appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-china-linked-fbi-surveillance-breach-major-incident/ also interesting: US Nuclear Weapons Data Compromised via SharePoint Zero-Day Attack Cybersecurity Snapshot: CISA Analyzes Malware…
-
Android Alert: 50 Google Play Apps Linked to ‘NoVoice’ Malware Reached 2.3M Downloads
NoVoice malware was found in 50 Android apps on Google Play, with 2.3 million downloads, by bypassing detection and targeting outdated devices. The post Android Alert: 50 Google Play Apps Linked to ‘NoVoice’ Malware Reached 2.3M Downloads appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-novoice-malware-android-google-play-50-apps/ also interesting: New Konfety Malware Variant…
-
Cisco 2026 State of Wireless Report: AI Wireless Threats Grow as Security Gaps Widen
Cisco finds AI-driven wireless attacks are rising as security gaps widen across complex networks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/cisco-2026-state-of-wireless-report-ai-wireless-threats-grow-as-security-gaps-widen/ also interesting: Your Network Is Showing Time to Go Stealth Cisco warns of critical API vulnerabilities in ISE and ISE-PIC Old threats, new consequences: 90% of cyber claims stem from email and remote…
-
Europe’s cyber agency blames hacking gangs for massive data breach and leak
CERT-EU blamed the cybercrime group TeamPCP for the recent hack on the European Commission, and said the notorious ShinyHunters gang was responsible for leaking the stolen data online. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/03/europes-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak/ also interesting: 9 things CISOs need know about the dark web Notorious BreachForums hacking site hit by ‘doomsday’ leak…
-
12 Agentic AI Startups To Watch In 2026
Agentic AI startups to watch in 2026 include early-stage vendors that showcased tools for agentic identity security, AI agent governance and agentic SOC platforms at RSAC. First seen on crn.com Jump to article: www.crn.com/news/security/2026/12-agentic-ai-startups-to-watch-in-2026 also interesting: Ransomware attacks: The evolving extortion threat to US financial institutions Top 10 vendors for AI-enabled security, according to CISOs…
-
Researchers warn of critical flaws in Progress ShareFile
Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/researchers-critical-flaws-progress-sharefile/816599/ also interesting: New PHP Vulnerability Exposes Windows Servers to Remote Code Execution Attackers exploit SimpleHelp RMM Software flaws for initial access Critical Vulnerability in Crowdstrike Falcon Sensor for Linux Enables TLS MiTM Exploits Microsoft-signed…
-
Trump’s FY2027 budget again targets CISA
Tags: cisaThe White House reiterated accusations about CISA’s counter-misinformation work to justify a major proposed reduction. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-white-house-budget-fy27/816615/ also interesting: CISA starts CVE >>vulnrichment<< program AI Tools Give Feds ‘Negligible’ Security Improvements CISA Planned to Kill .Gov Alerts, Then It Reversed Course Cisco Adaptive Security Appliance wird über 0-day angegriffen
-
NHI Governance Is the Outcome. GitGuardian Is How You Get There
Learn how GitGuardian supports NHI governance with a secrets-first model that improves visibility, reduces sprawl, and helps teams manage machine identity risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/nhi-governance-is-the-outcome-gitguardian-is-how-you-get-there/ also interesting: Fifteen Best Practices to Navigate the Data Sovereignty Waters AI Adoption Surges While Governance Lags, Report Warns of Growing Shadow Identity Risk Use…
-
prompted 2026 Evaluating Threats Automating Defense At Google
Author, Creator & Presenter: Heather Adkins, VP of Security Engineering, Google & Four Flynn, VP Security and Privacy, Google Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’) YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-evaluating-threats-automating-defense-at-google/ also interesting: New security…
-
Claude Source Code Leak Highlights Big Supply Chain Missteps
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight also interesting: Ransomware attacks: The evolving extortion threat to US financial institutions CAASM and EASM: Top 12 attack surface discovery and management tools Software developers: Prime cyber targets…
-
AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech
See what you missed in Daily Tech Insider from March 30April 3. The post AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/ai-breakthroughs-security-breaches-and-industry-shakeups-define-the-week-in-tech/ also interesting: Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud ThreatPlattformen ein Kaufratgeber Beyond…
-
Armis State of Cyberwarfare Report: AI-Powered Cyber Attacks Accelerate Worldwide
Armis finds AI-driven cyberattacks are accelerating, widening the gap between perceived readiness and real-world defenses. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/armis-state-of-cyberwarfare-report-ai-powered-cyber-attacks-accelerate-worldwide/ also interesting: 12 cybersecurity resolutions for 2025 Keeper Security Launches KeeperAI 8 things CISOs can’t afford to get wrong in 2026 Cybercrime Inc.: When hackers are better organized than IT
-
High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week
Weekly summary of Cybersecurity Insider newsletters First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/high-severity-vulnerabilities-supply-chain-breaches-and-ai-threats-redefine-cybersecurity-this-week/ also interesting: Agents, Robotics, and Auth Oh My! – Impart Security LLMs hype versus reality: What CISOs should focus on We’ve crossed the security singularity – Impart Security Top 10 Cybersecurity Predictions for 2026
-
North Korealinked hackers drain $285M from Drift in sophisticated attack
Drift lost $285M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a $285 million cryptocurrency heist in a highly sophisticated attack likely linked to North Korea. Threat actors used durable nonce accounts to pre-sign and delay transactions, while also compromising multisig approvals…
-
AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data
AI firm Mercor confirms a breach linked to a LiteLLM supply chain attack, as hackers claim to have stolen 4TB of sensitive data and internal systems. First seen on hackread.com Jump to article: hackread.com/ai-firm-mercor-breach-hackers-4tb-data/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Cybersecurity Snapshot: New Standard for AI System Security Published, While…
-
Government agencies see cyber threats as major barrier to tech improvements
Federal leaders also see opportunities to accelerate cyber defense with AI, but most agencies are still only testing AI tools, ;a new survey found. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cybersecurity-modernization-ai-ey-survey/816590/ also interesting: Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre’s Essential Eight Key cybersecurity takeaways from the 2026 NDAA Top…
-
AutoSecT Mobile: Automating Android and iOS Security Testing
Your banking app knows your face. It reads your fingerprint. It trusts that the person holding the phone is really you. But what if it’s wrong? Mobile-first banking has made financial services more accessible than ever. You can transfer money, pay bills, and apply for loans all from your phone, all in seconds. But this……
-
How to Prepare Your Business for AI: A Workflow-First Approach
AI is being positioned as the fastest path to efficiency, scale, and smarter decisions. But for most businesses, that promise is not translating into results….Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/04/how-to-prepare-your-business-for-ai-a-workflow-first-approach/ also interesting: Cyber Attacks Are Up 47% in 2025 AI is One Key Factor How AI is reshaping cybersecurity operations Wie…
-
Cybersecurity Workforce Study 2025 – Cybersicherheit ist attraktiv für Frauen trotz ungleicher Behandlung
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-zufriedenheit-frauen-steigt-2025-a-a2114b2a5b9202f15d7607e18bd3b74c/ also interesting: Minimierung von Schwachstellen in OT-Umgebungen ITJobs 5 bittere Wahrheiten Fachkräftemangel bedroht Cybersicherheit Agentic AI der neue Horror für Sicherheitsentscheider?
-
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain also interesting: AI development pipeline attacks expand CISOs’ software supply chain risk ASPM buyer’s guide: 7 products to help secure your applications Serious vulnerability found in Rust library…
-
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain also interesting: ASPM buyer’s guide: 7 products to help secure your applications Serious vulnerability found in Rust library 10 promising cybersecurity startups CISOs should know about Chainguard Unveils…
-
Picking Up ‘Skull Vibrations’? Could Be XR Headset Authentication
Tags: authenticationSkull vibration harmonics generated by vital signs can be used to sign in to VR, AR, and MR headsets, according to emerging research. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication also interesting: Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps The Security-Convenience Tradeoff in Authentication: Are We Finally Solving It?…
-
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/ also interesting: 9 things CISOs need know about the dark web Purdue 2.0? : Rising to the Challenge to secure…
-
CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access
CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims. In March 2026, Kaspersky researchers uncovered a Telegram-based campaign promoting a previously unknown malware sold as a MaaS with three subscription tiers. The Trojan offers a wide range of features, including RAT capabilities, data theft, keylogging,…
-
AI Future: The Leading International AI and Web3 Forum to Take Place in April
Moscow, Russia, 3rd April 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april/ also interesting: U.S. Disrupts AI-Powered Russian State-Sponsored Hackers Bot Farm Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight 9 things CISOs need know about the dark web Cybersecurity Snapshot: Global Agencies…
-
Massachusetts emergency communications system impacted by cyberattack
An emergency communications system used across a handful of small towns in northern Massachusetts was impacted by a cyberattack. First seen on therecord.media Jump to article: therecord.media/massachusetts-emergency-alert-cyberattack also interesting: FCC calls for urgent cybersecurity overhaul amid Salt Typhoon espionage case Russia fires its biggest cyberweapon against Ukraine 5 Encrypted Attack Predictions for 2025 Geopolitical tensions…
-
Simplifying MBA obfuscation with CoBRA
Mixed Boolean-Arithmetic (MBA) obfuscation disguises simple operations like x + y behind tangles of arithmetic and bitwise operators. Malware authors and software protectors rely on it because no standard simplification technique covers both domains simultaneously; algebraic simplifiers don’t understand bitwise logic, and Boolean minimizers can’t handle arithmetic. We’re releasing CoBRA, an open-source tool that simplifies…
-
Board-Ready Security Metrics That Actually Matter
<div cla TL;DR Board-ready security metrics translate technical capabilities into financial risk and business outcomes. Boards need visibility across three dimensions: risk exposure, incident response capability, and governance compliance. Runtime application security contributes meaningful data points to these broader metrics, helping security leaders present more complete organizational risk assessments. First seen on securityboulevard.com Jump to…
-
New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs
A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/new-phishing-platform-credential/ also interesting: Cybersecurity Snapshot: NIST Offers Zero Trust Implementation Advice, While OpenAI Shares ChatGPT Misuse Incidents Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms…
-
Source Code Leaks Highlight Lack of Supply Chain Oversight
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight also interesting: Walking the Walk: How Tenable Embraces Its >>Secure by Design<< Pledge to CISA 8 biggest cybersecurity threats manufacturers face 5 things to know about ransomware threats…
-
Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)
Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an unauthenticated, remote … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/ also interesting: Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators Cybersecurity Snapshot: Expert…
-
Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks
Tags: access, attack, breach, credentials, exploit, hacker, infrastructure, russia, ukraine, vulnerabilityIn a new report, CERT-UA said attackers are revisiting previously breached infrastructure to check whether access is still available, whether exploited vulnerabilities have been patched and whether previously obtained credentials remain valid. First seen on therecord.media Jump to article: therecord.media/ukraine-warns-russian-hackers-revisiting-old-attacks also interesting: The most notorious and damaging ransomware of all time Cybersecurity Snapshot: Expert Advice…
-
Neue SparkCat-Malware in Google Play und App Store
Eine neue Version der SparkCat-Malware verbreitet sich über beliebte Apps in Google Play und im App Store. Sie kann heimlich Fotos auswerten und sensible Daten wie Krypto-Wallet-Zugangsdaten abgreifen. Experten warnen vor gezielten Angriffen auf Nutzer in Asien und weltweit. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/neue-sparkcat-malware also interesting: Privacy Roundup: Week 12 of Year…

