Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

06/02/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

06/02/2026 0 Comments 0 tags

Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

05/02/2026 0 Comments 0 tags

The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

05/02/2026 0 Comments 0 tags

This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in

The Buyer’s Guide to AI Usage Control

05/02/2026 0 Comments 0 tags

Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

05/02/2026 0 Comments 0 tags

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

05/02/2026 0 Comments 0 tags

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked

Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers

05/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

04/02/2026 0 Comments 0 tags

Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI)

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

04/02/2026 0 Comments 0 tags

Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate system features” to bypass traditional