Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

23/05/2026 0 Comments 0 tags

A new “coordinated” supply chain attack campaign has impacted eight packages on Packagist including malicious code designed to run a Linux binary retrieved from a GitHub Releases URL. “Although the

npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks

23/05/2026 0 Comments 0 tags

GitHub has rolled out new controls for npm to improve the security of the software supply chain, giving maintainers the ability to explicitly approve a release prior to the packages

Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software

23/05/2026 0 Comments 0 tags

Anthropic on Friday disclosed that Project Glasswing has helped uncover more than 10,000 high- or critical-severity vulnerabilities across some of the most “systemically” important software across the world since the

Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

23/05/2026 0 Comments 0 tags

Cybersecurity researchers have flagged a fresh software supply chain attack campaign that has targeted multiple PHP packages belonging to Laravel-Lang to deliver a comprehensive credential-stealing framework. The affected packages include

Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

23/05/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw impacting Drupal Core to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of

LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

23/05/2026 0 Comments 0 tags

A maximum-severity security vulnerability impacting LiteSpeed User-End cPanel Plugin has come under active exploitation in the wild. The flaw, tracked as CVE-2026-48172 (CVSS score: 10.0), relates to an instance of

First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

22/05/2026 0 Comments 0 tags

Authorities in Europe and North America have announced the dismantling of a criminal virtual private network (VPN) service used by criminal actors to obscure the origins of ransomware attacks, data

Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

22/05/2026 0 Comments 0 tags

The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine’s National Security and Defense Council) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to

Making Vulnerable Drivers Exploitable Without Hardware – The BYOVD Perspective

22/05/2026 0 Comments 0 tags

1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This

Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows

22/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a six-hour window. “Using throwaway accounts and