TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

31/03/2026 0 Comments 0 tags

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

31/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

31/03/2026 0 Comments 0 tags

The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed.

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

31/03/2026 0 Comments 0 tags

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT. “The operation

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

31/03/2026 0 Comments 0 tags

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

30/03/2026 0 Comments 0 tags

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

30/03/2026 0 Comments 0 tags

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. “It likely uses AI-assisted obfuscation and

3 SOC Process Fixes That Unlock Tier 1 Productivity

30/03/2026 0 Comments 0 tags

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

30/03/2026 0 Comments 0 tags

Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

30/03/2026 0 Comments 0 tags

Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian’s State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and