Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

24/03/2026 0 Comments 0 tags

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

24/03/2026 0 Comments 0 tags

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

24/03/2026 0 Comments 0 tags

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

24/03/2026 0 Comments 0 tags

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

24/03/2026 0 Comments 0 tags

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew,

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

23/03/2026 0 Comments 0 tags

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

23/03/2026 0 Comments 0 tags

Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

23/03/2026 0 Comments 0 tags

AWS Bedrock is Amazon’s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

23/03/2026 0 Comments 0 tags

Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver malware. The email campaigns take advantage of the

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

23/03/2026 0 Comments 0 tags

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of