China-Nexus Hackers Use Massive Covert Botnets Globally
A newly issued cybersecurity advisory highlights an evolution in the tactics, techniques and procedures (TTPs) employed by China-Nexus threat actors. The report, released with support from the…
A newly issued cybersecurity advisory highlights an evolution in the tactics, techniques and procedures (TTPs) employed by China-Nexus threat actors. The report, released with support from the…
The UK Biobank data breach has intensified scrutiny around the handling and protection of sensitive health information, even when such data is stripped of personally…
An unnamed threat actor has succesfully incorporated Anthropic’s Claude Code AI coding assistant into their workflow in order to run a massive credential harvesting operation,…
The Trump administration is vowing to crack down on foreign tech companies’ exploitation of U.S. artificial intelligence models, singling out China at a time that…
Checkmarx supply chain attack impacts Bitwarden npm distribution path Pierluigi Paganini April 24, 2026 Bitwarden CLI was hit by the Checkmarx supply chain attack. Version…
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Compromising an NPM package with 40M weekly downloads Bypassing Cloudflare WAF for…
Your legal team just handed you a 400-page document and said “figure out compliance.” The EU AI Act is live, your organization falls under its…
Campaigns employing commercial surveillance vendors tracked targets by exploiting mobile phone network vulnerabilities in what researchers said Thursday was the first-ever linking of “real-world attack…
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions 23 Apr 2026 • , 6 min.…
Commonwealth Bank says it has deployed an “agentic AI” system intended to detect emerging fraud and scam patterns in transaction and payments data and propose…
Why “more alerts” isn’t the same as better security If you run security in an enterprise environment, you already know the problem. Generic detection tools…
In a world of many noisy tools, Huntress has always been mindful of how real people are fighting against cyberattacks every day. Our goal is…