Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

01/05/2026 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

01/05/2026 0 Comments 0 tags

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

30/04/2026 0 Comments 0 tags

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

30/04/2026 0 Comments 0 tags

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

30/04/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

30/04/2026 0 Comments 0 tags

Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers,

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

30/04/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

30/04/2026 0 Comments 0 tags

Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that could have allowed attackers to execute

SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware

29/04/2026 0 Comments 0 tags

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, SafeDep, Socket, StepSecurity, and

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

29/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic’s Claude Opus large language model (LLM). The package