How SOCs Close a Critical Risk in 3 Steps | Cybersecurity
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking…
Read moreQilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools | Cybersecurity
Ravie LakshmananApr 06, 2026Ransomware / Endpoint Security Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised…
Read moreKiller robots are here. Now what? (Lock and Code S07E07) | Malware
Big news: Lock and Code is nominated for a Webby Award! You can help us win the People’s Voice Award by voting here. This week on the Lock and Code…
Read more$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation | Cybersecurity
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the…
Read more36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants | Cybersecurity
Ravie LakshmananApr 05, 2026Malware / DevSecOps Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to…
Read moreThat dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords | Malware
As layoffs surge and job seekers flood the market, phishing campaigns impersonating major brands, including Coca-Cola and Ferrari, are ramping up—and they’re more sophisticated than ever. The first scam we…
Read moreChina-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing | Cybersecurity
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a…
Read moreBlocking children from social media is a badly executed good idea | Malware
While we can probably all agree that there is more than enough proof that social media is bad for the mental health of our children, the methods we are trying…
Read moreMicrosoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers | Cybersecurity
Ravie LakshmananApr 03, 2026Linux / Server Hardening Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution,…
Read moreNew SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images | Cybersecurity
Ravie LakshmananApr 03, 2026Mobile Security / Threat Intelligence Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year…
Read moreHackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials | Cybersecurity
Ravie LakshmananApr 02, 2026Vulnerability / Threat Intelligence A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web…
Read moreApple expands “DarkSword” patches to iOS 18.7.7 | Malware
Apple widened its latest iOS 18 security update to cover far more iPhones and iPads, specifically to stop real‑world DarkSword attacks that can compromise a device from a single website…
Read morePre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories | Cybersecurity
Ravie LakshmananApr 02, 2026Cybersecurity / Hacking News The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just…
Read moreWhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action | Cybersecurity
Ravie LakshmananApr 02, 2026Surveillance / Mobile Security Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that…
Read moreWhy we’re still not doing April Fools’ Day | Malware
People lost an estimated $442 billion to scams last year worldwide, according to the Global Anti-Scam Alliance. The scale of that is hard to picture, but people’s day-to-day scam experience…
Read moreMalwarebytes Privacy VPN receives full third-party audit | Malware
For the careful VPN customer today, so much depends upon a privacy promise, made, too often, by a company without proof. No-logs policies, modern encryption algorithms, a refusal to store sensitive customer information, and full ownership…
Read moreWikipedia’s AI agent row likely just the beginning of the bot-ocalypse | Malware
The Internet is filled with people who insist on being right. In the past, at least they could be reasonably sure that they were arguing with other humans. Those days…
Read moreWhatsApp on Windows users targeted in new campaign, warns Microsoft | Malware
Microsoft researchers found a campaign that abuses WhatsApp attachments to sneak a script onto Windows machines which will lead to the attacker gaining remote control. WhatsApp offers a desktop application…
Read moreCERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails | Cybersecurity
Ravie LakshmananApr 01, 2026Email Security / Artificial Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself…
Read moreMicrosoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass | Cybersecurity
Ravie LakshmananApr 01, 2026Social Engineering / Malware Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity,…
Read moreGoogle Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069 | Cybersecurity
Ravie LakshmananApr 01, 2026Threat Intelligence / Software Security Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity…
Read moreAsking AI for personal advice is a bad idea, Stanford study shows | Malware
Stanford computer scientists just proved what therapists already suspected: AI chatbots will agree with almost anything you say to keep you happy. The researchers caught these systems validating dangerous decisions…
Read moreAndroid Developer Verification Rollout Begins Ahead of September Enforcement | Cybersecurity
Ravie LakshmananMar 31, 2026Mobile Security / Compliance Google on Monday said it’s officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful…
Read moreAxios supply chain attack chops away at npm trust | Malware
Researchers found that compromised Axios versions installed a Remote Access Trojan. Axios is a promise-based HTTP Client for node.js, basically a helper tool that developers use behind the scenes to let apps…
Read moreVertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts | Cybersecurity
Ravie LakshmananMar 31, 2026Cloud Security / AI Security Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence (AI) agents to…
Read moreAxios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account | Cybersecurity
The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4…
Read moreOpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability | Cybersecurity
A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt…
Read moreNew macOS security feature will alert users about possible ClickFix attacks | Malware
Rumor has it that Apple deployed a new security feature in the fight against ClickFix. The new feature will be available for macOS Tahoe 26.4 and it will warn Mac users…
Read moreDeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials | Cybersecurity
Ravie LakshmananMar 30, 2026Threat Intelligence / Browser Security A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to…
Read moreThe State of Secrets Sprawl 2026: 9 Takeaways for CISOs | Cybersecurity
Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian’s State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and…
Read more