How SOCs Close a Critical Risk in 3 Steps | Cybersecurity

Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking…

Read more

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools | Cybersecurity

Ravie LakshmananApr 06, 2026Ransomware / Endpoint Security Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised…

Read more

Killer robots are here. Now what? (Lock and Code S07E07) | Malware

Big news: Lock and Code is nominated for a Webby Award! You can help us win the People’s Voice Award by voting here. This week on the Lock and Code…

Read more

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation | Cybersecurity

Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the…

Read more

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants | Cybersecurity

Ravie LakshmananApr 05, 2026Malware / DevSecOps Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to…

Read more

That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malware

As layoffs surge and job seekers flood the market, phishing campaigns impersonating major brands, including Coca-Cola and Ferrari, are ramping up—and they’re more sophisticated than ever. The first scam we…

Read more

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing | Cybersecurity

A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a…

Read more

Blocking children from social media is a badly executed good idea | Malware

While we can probably all agree that there is more than enough proof that social media is bad for the mental health of our children, the methods we are trying…

Read more

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers | Cybersecurity

Ravie LakshmananApr 03, 2026Linux / Server Hardening Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution,…

Read more

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images | Cybersecurity

Ravie LakshmananApr 03, 2026Mobile Security / Threat Intelligence Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year…

Read more

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials | Cybersecurity

Ravie LakshmananApr 02, 2026Vulnerability / Threat Intelligence A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web…

Read more

Apple expands “DarkSword” patches to iOS 18.7.7 | Malware

Apple widened its latest iOS 18 security update to cover far more iPhones and iPads, specifically to stop real‑world DarkSword attacks that can compromise a device from a single website…

Read more

Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories | Cybersecurity

Ravie LakshmananApr 02, 2026Cybersecurity / Hacking News The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just…

Read more

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action | Cybersecurity

Ravie LakshmananApr 02, 2026Surveillance / Mobile Security Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that…

Read more

Why we’re still not doing April Fools’ Day | Malware

People lost an estimated $442 billion to scams last year worldwide, according to the Global Anti-Scam Alliance. The scale of that is hard to picture, but people’s day-to-day scam experience…

Read more

Malwarebytes Privacy VPN receives full third-party audit | Malware

For the careful VPN customer today, so much depends upon a privacy promise, made, too often, by a company without proof.   No-logs policies, modern encryption algorithms, a refusal to store sensitive customer information, and full ownership…

Read more

Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse | Malware

The Internet is filled with people who insist on being right. In the past, at least they could be reasonably sure that they were arguing with other humans. Those days…

Read more

WhatsApp on Windows users targeted in new campaign, warns Microsoft | Malware

Microsoft researchers found a campaign that abuses WhatsApp attachments to sneak a script onto Windows machines which will lead to the attacker gaining remote control. WhatsApp offers a desktop application…

Read more

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails | Cybersecurity

Ravie LakshmananApr 01, 2026Email Security / Artificial Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself…

Read more

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass | Cybersecurity

Ravie LakshmananApr 01, 2026Social Engineering / Malware Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity,…

Read more

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069 | Cybersecurity

Ravie LakshmananApr 01, 2026Threat Intelligence / Software Security Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity…

Read more

Asking AI for personal advice is a bad idea, Stanford study shows | Malware

Stanford computer scientists just proved what therapists already suspected: AI chatbots will agree with almost anything you say to keep you happy. The researchers caught these systems validating dangerous decisions…

Read more

Android Developer Verification Rollout Begins Ahead of September Enforcement | Cybersecurity

Ravie LakshmananMar 31, 2026Mobile Security / Compliance Google on Monday said it’s officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful…

Read more

Axios supply chain attack chops away at npm trust | Malware

Researchers found that compromised Axios versions installed a Remote Access Trojan. Axios is a promise-based HTTP Client for node.js, basically a helper tool that developers use behind the scenes to let apps…

Read more

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts | Cybersecurity

Ravie LakshmananMar 31, 2026Cloud Security / AI Security Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence (AI) agents to…

Read more

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account | Cybersecurity

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4…

Read more

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability | Cybersecurity

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt…

Read more

New macOS security feature will alert users about possible ClickFix attacks | Malware

Rumor has it that Apple deployed a new security feature in the fight against ClickFix. The new feature will be available for macOS Tahoe 26.4 and it will warn Mac users…

Read more

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials | Cybersecurity

Ravie LakshmananMar 30, 2026Threat Intelligence / Browser Security A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to…

Read more

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs | Cybersecurity

Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian’s State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and…

Read more
Update cookies preferences