Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

03/04/2026 0 Comments 0 tags

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender

Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture

03/04/2026 0 Comments 0 tags

The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

03/04/2026 0 Comments 0 tags

The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069.

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

03/04/2026 0 Comments 0 tags

Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. “Earlier today, a malicious actor

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

03/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

02/04/2026 0 Comments 0 tags

A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

02/04/2026 0 Comments 0 tags

Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

02/04/2026 0 Comments 0 tags

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the

The State of Trusted Open Source Report

02/04/2026 0 Comments 0 tags

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

02/04/2026 0 Comments 0 tags

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. “Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per