Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers

05/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

04/02/2026 0 Comments 0 tags

Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate system features” to bypass traditional

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

04/02/2026 0 Comments 0 tags

Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI)

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

04/02/2026 0 Comments 0 tags

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

04/02/2026 0 Comments 0 tags

An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

04/02/2026 0 Comments 0 tags

Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

04/02/2026 0 Comments 0 tags

Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

04/02/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

04/02/2026 0 Comments 0 tags

The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

03/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could