Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

31/03/2026 0 Comments 0 tags

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

30/03/2026 0 Comments 0 tags

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

30/03/2026 0 Comments 0 tags

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. “It likely uses AI-assisted obfuscation and

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

30/03/2026 0 Comments 0 tags

Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and

3 SOC Process Fixes That Unlock Tier 1 Productivity

30/03/2026 0 Comments 0 tags

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

30/03/2026 0 Comments 0 tags

Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian’s State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

30/03/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that’s distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

30/03/2026 0 Comments 0 tags

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a “complex and well-resourced operation.” The campaigns

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

28/03/2026 0 Comments 0 tags

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

28/03/2026 0 Comments 0 tags

A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE-2026-3055 (CVSS score: 9.3),