Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

01/05/2026 0 Comments 0 tags

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

30/04/2026 0 Comments 0 tags

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

30/04/2026 0 Comments 0 tags

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

30/04/2026 0 Comments 0 tags

Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers,

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

30/04/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

30/04/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

30/04/2026 0 Comments 0 tags

Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that could have allowed attackers to execute

SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware

29/04/2026 0 Comments 0 tags

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, SafeDep, Socket, StepSecurity, and

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

29/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic’s Claude Opus large language model (LLM). The package

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

29/04/2026 0 Comments 0 tags

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren’t