Tag: attack
-
State CISOs Are Losing Confidence as AI Threats Surge
Tightening Budgets and AI-Enabled Attacks Stretch State Cyber Defenses. State CISO confidence has collapsed, with just 22% saying their data is protected from cyberthreats. The 2026 NASCIO-Deloitte study points to AI-enabled attacks, third-party vendor risk and the worst budget picture in years as states rethink how they defend public data. First seen on govinfosecurity.com Jump…
-
TeamPCP Hits SAP Packages With ‘Mini Shai-Hulud’ Attack
Several npm packages for SAP’s cloud application development ecosystem have been compromised as TeamPCP’s supply chain attacks broaden. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/teampcp-sap-packages-mini-shai-hulud
-
Hackers are actively exploiting a bug in cPanel, used by millions of websites
Web hosts are scrambling to fix the bug under active attack by hackers. One company said hackers have been abusing the bug for months. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/30/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites/
-
Are Hospital Attacks ‘Terrorism,’ Patient Deaths ‘Murder’?
Experts Weigh How the US Could Raise the Stakes for Would-Be Attackers. As ransomware attacks on hospitals continue to disrupt patient care and sometimes contribute to serious patient harm, policymakers are increasingly debating whether the U.S. should treat such incidents as acts of terrorism – and even pursue homicide charges when a patient death occurs.…
-
Almost half of UK businesses hit by cyber attacks
The government’s annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642507/Almost-half-of-UK-businesses-hit-by-cyber-attacks
-
SAP npm Supply Chain Attack Targets Developer Credentials
A supply chain attack on SAP npm packages used preinstall scripts to steal developer and CI/CD credentials. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/sap-npm-supply-chain-attack-targets-developer-credentials/
-
PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft.According to Aikido Security, OX Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign…
-
Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerability
Tags: access, ai, attack, browser, cisa, cloud, container, crypto, cve, cybersecurity, data, exploit, flaw, infrastructure, kev, linux, mitigation, ransomware, risk, tool, update, vulnerabilityA flaw in the Linux kernel present since 2017 allows a local user to gain root access on virtually every major Linux distribution. A public exploit is available and reported to work reliably. Key Takeaways CVE-2026-31431 is a high severity local privilege escalation vulnerability in the Linux kernel reportedly affecting virtually every major distribution released…
-
FBI links cybercriminals to sharp surge in cargo theft attacks
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/
-
FBI links cybercriminals to sharp surge in cargo theft attacks
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/
-
FBI links cybercriminals to sharp surge in cargo theft attacks
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/
-
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft.According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is assessed…
-
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft.According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is assessed…
-
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft.According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is assessed…
-
AI Adoption Fuels Rise in Identity Attack Path Risk
A new SpecterOps report shows AI is driving identity risk, pushing organizations to prioritize attack path visibility and reduce exposure. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ai-adoption-fuels-rise-in-identity-attack-path-risk/
-
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work…
-
The Top 3 Ways Criminals Use AI in Cyber Attacks
AI-driven SaaS security risks grow fast. Here’s what to watch out for and how to prevent breaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/the-top-3-ways-criminals-use-ai-in-cyber-attacks/
-
What Happens in the First 24 Hours After a New Asset Goes Live
Tags: attackWhen a new asset goes live, attackers start scanning within minutes. Sprocket Security shows how automated attacks move from discovery to compromise in under 24 hours. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/what-happens-in-the-first-24-hours-after-a-new-asset-goes-live/
-
Ransomware Attacks on Schools: 4 Warning Signs IT Teams Shouldn’t Ignore
Ransomware attacks are increasingly threatening to K12 schools, with districts of all sizes becoming prime targets for cybercriminals. These school ransomware attacks don’t just impact IT systems. They can shut down classrooms, disrupt learning for days or even weeks, and expose sensitive student and staff data. The financial and operational costs of recovery can be…
-
IP Spoofing Explained: How to Detect and Prevent IP Spoofing Attacks
Introduction IP spoofing is one of the strategies that can be employed in the culmination of diverse types of cyber attacks. The knowledge of what IP spoofing means, how it is done, and how to avoid being a victim of such attacks is essential for one to be secure on the internet and to preventRead…
-
WAF Defense in Crisis? NSFOCUS Locks Down “Ghost Bits” Attacks in Advance
Incident Review In April 2026, Black Hat Asia 2026 disclosed a systematic security threat named Ghost Bits, targeting underlying encoding flaws in the Java ecosystem that can render mainstream WAF/IDS defenses completely ineffective. The core of this risk lies in inconsistent encoding interpretations of the same input between the security detection chain and the application……
-
AI is widening the asymmetry between attackers and defenders
As threat actors leverage AI to launch attacks at machine speed, cyber defenders must adopt an assumed breach mindset and prioritise breach containment First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642503/AI-is-widening-the-asymmetry-between-attackers-and-defenders
-
Best AI security tools for exposure assessment in 2026
AI is transforming both attacks and defense. To avoid being outstripped by AI-powered adversaries, organizations need platforms that prioritize risk in real-time. Exposure management with AI is the next evolution in comprehensive cybersecurity. AI-powered exposure management, as embodied in continuous threat exposure management (CTEM) platforms, help security leaders keep an eye on the entire ecosystem,…
-
Bad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals
Tags: ai, api, application-security, attack, automation, banking, business, container, control, crime, cyber, cybercrime, data, defense, detection, exploit, finance, fraud, identity, infrastructure, intelligence, Internet, LLM, malicious, monitoring, resilience, risk, service, threat, tool, vulnerabilityBad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals josh.pearson@t“¦ Thu, 04/30/2026 – 07:31 The modern internet is becoming less human by the day. Bot traffic is increasing, and human traffic is shrinking. Malicious automated traffic is getting harder to spot. The Thales 2026 Bad Bot Report, now in it’s…
-
The Real Cost of a Data Breach for Small Businesses How to Prevent
Tags: attack, breach, business, cyberattack, cybersecurity, data, data-breach, finance, risk, threatData breaches pose a serious threat to small businesses, often resulting in significant financial losses, operational downtime, and long-term trust erosion. This blog examines the real costs of cyberattacks on SMBs, including direct expenses, hidden operational impacts, and reputational damage that can exceed recovery costs. It outlines the most common attack types targeting small organizations…
-
Compromised SAP npm Packages Found Harvesting Developer and CI/CD Secrets
Security researchers have identified a severe supply chain attack targeting the SAP developer ecosystem. A threat group identified as TeamPCP has compromised multiple legitimate SAP npm packages in a new campaign named Mini Shai Hulud. The operation relies on injecting malicious pre-install scripts that execute silently during dependency installation. By leveraging a multi-stage payload, the…
-
ProFTPD SQL Injection Flaw Opens Door To Remote Code Execution Attacks
A newly disclosed flaw in ProFTPD is drawing urgent attention because it can let attackers move from a simple SQL injection bug to authentication bypass, privilege escalation, and in some environments even remote code execution. Tracked as CVE-2026-42167, the issue was found in ProFTPD’s mod_sql extension by ZeroPath Research, and MITRE assigned it a CVSS…
-
Adaptive Security Leadership in an Expanding Threat Surface
Tags: access, attack, automation, control, cyber, data, identity, least-privilege, resilience, risk, saas, service, technology, threat, zero-trustLast week I joined fellow security leaders at CISO Inspire Summit North for a panel discussion on The Expanding Threat Surface: Adaptive Security Leadership for 2026 and Beyond. It was a timely discussion, because the challenge facing security leaders today is not simply more threats. It is more connections, more dependencies, and more complexity. Suppliers, SaaS, identities, automation…
-
Researchers unearth industrial sabotage malware that predated Stuxnet by 5 years
fast16.sys, is briefly mentioned in the 2017 Shadow Brokers leak of documents covering exploits and tools used by US National Security Agency cyber teams.”This 2005 attack is a harbinger for sabotage operations targeting ultra expensive high-precision computing workloads of national importance like advanced physics, cryptographic, and nuclear research workloads,” the SentinelOne researchers said in their…

