Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

24/04/2026 0 Comments 0 tags

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

24/04/2026 0 Comments 0 tags

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

23/04/2026 0 Comments 0 tags

A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

23/04/2026 0 Comments 0 tags

You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes.

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

23/04/2026 0 Comments 0 tags

Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from Socket. “The affected package version appears to be

Project Glasswing Proved AI Can Find the Bugs. Who’s Going to Fix Them?

23/04/2026 0 Comments 0 tags

Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has

[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

23/04/2026 0 Comments 0 tags

Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

23/04/2026 0 Comments 0 tags

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

23/04/2026 0 Comments 0 tags

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

23/04/2026 0 Comments 0 tags

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as