Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

25/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges. According to a

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

25/04/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV)

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

24/04/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

24/04/2026 0 Comments 0 tags

The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a

26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

24/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

24/04/2026 0 Comments 0 tags

The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

24/04/2026 0 Comments 0 tags

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

24/04/2026 0 Comments 0 tags

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

23/04/2026 0 Comments 0 tags

A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

23/04/2026 0 Comments 0 tags

You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes.