Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

24/03/2026 0 Comments 0 tags

An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners and information stealers. “The campaign uses highly obfuscated VBScript files

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

24/03/2026 0 Comments 0 tags

On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types,

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

24/03/2026 0 Comments 0 tags

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

24/03/2026 0 Comments 0 tags

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

24/03/2026 0 Comments 0 tags

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

24/03/2026 0 Comments 0 tags

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

24/03/2026 0 Comments 0 tags

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew,

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

23/03/2026 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

23/03/2026 0 Comments 0 tags

Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

23/03/2026 0 Comments 0 tags

AWS Bedrock is Amazon’s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That