Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

21/03/2026 0 Comments 0 tags

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that have led to the compromise of a large number

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

20/03/2026 0 Comments 0 tags

Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets. The

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

20/03/2026 0 Comments 0 tags

A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

20/03/2026 0 Comments 0 tags

Sansec is warning of a critical security flaw in Magento’s REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover. The vulnerability

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

20/03/2026 0 Comments 0 tags

Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

20/03/2026 0 Comments 0 tags

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

20/03/2026 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as

Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks

20/03/2026 0 Comments 0 tags

Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out via powerful exploit kits like Coruna

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

19/03/2026 0 Comments 0 tags

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. “Speagle is designed to surreptitiously harvest sensitive information

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

19/03/2026 0 Comments 0 tags

A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a