CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

03/05/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of

Trellix Confirms Source Code Breach With Unauthorized Repository Access

02/05/2026 0 Comments 0 tags

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a “portion” of its source code. It said it “recently identified” the compromise of its

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

01/05/2026 0 Comments 0 tags

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a “phishing relay” to distribute phishing emails with an aim to compromise Facebook accounts. The activity has

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

01/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and Southeast Asia, along with one European government belonging to NATO.

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

01/05/2026 0 Comments 0 tags

Cybersecurity researchers are warning of two cybercrime groups that are carrying out “rapid, high-impact attacks” operating almost within the confines of SaaS environments, while leaving minimal traces of their actions.

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

01/05/2026 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

01/05/2026 0 Comments 0 tags

The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the fastest-growing sector[2]. Despite this opportunity, many MSPs

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

01/05/2026 0 Comments 0 tags

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

30/04/2026 0 Comments 0 tags

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

30/04/2026 0 Comments 0 tags

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools