APT36 Targets Indian Government Systems Using Malicious Windows LNK Files
01
Jan
2026

APT36 Targets Indian Government Systems Using Malicious Windows LNK Files

A sophisticated cyber-espionage operation attributed to APT36, also known as Transparent Tribe, has been identified targeting Indian governmental, academic, and…

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts
01
Jan
2026

Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts

Apache StreamPipes has released an urgent security advisory addressing CVE-2025-47411, a critical privilege escalation vulnerability affecting versions 0.69.0 through 0.97.0….

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates
01
Jan
2026

Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV/BlackCat Affiliates

A federal district court in the Southern District of Florida accepted guilty pleas from two cybersecurity professionals who turned their…

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation
31
Dec
2025

Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation

A groundbreaking study from researchers at the University of Luxembourg reveals a critical security paradigm shift: large language models (LLMs)…

Shai-Hulud Supply Chain Attack Drained .5 Million from Trust Wallet Users
31
Dec
2025

Shai-Hulud Attack Drained $8.5M From Trust Wallet Users

Trust Wallet users had $8.5 million in crypto assets stolen in a cyberattack linked to the second wave of the…

report-ad-banner
31
Dec
2025

Shai-Hulud Attack Drained $8.5M From Trust Wallet Users

Trust Wallet users had $8.5 million in crypto assets stolen in a cyberattack linked to the second wave of the…

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users
31
Dec
2025

DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users

A sophisticated Chinese threat actor dubbed DarkSpectre has compromised 8.8 million users across Chrome, Edge, and Firefox through three distinct…

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework
31
Dec
2025

NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework

NeuroSploit v2 is an advanced AI-powered penetration testing framework designed to automate and enhance offensive security operations. Leveraging cutting-edge large…

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks
31
Dec
2025

New Cybercrime Tool “ErrTraffic” Enables Automated ClickFix Attacks

The cybercriminal underground has entered a new phase of industrialization. Hudson Rock researchers have uncovered ErrTraffic v2, a sophisticated ClickFix-as-a-Service…

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS
31
Dec
2025

GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS

GlassWorm has returned with a dangerous new evolution. The notorious self-propagating malware, which first surfaced in October as an invisible…

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
31
Dec
2025

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Dec 31, 2026Ravie LakshmananSoftware Security / Data Breach Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud…

ESA disclosed a data breach, hackers breached external servers
31
Dec
2025

ESA disclosed a data breach, hackers breached external servers

ESA disclosed a data breach, hackers breached external servers Pierluigi Paganini December 31, 2025 ESA confirmed a data breach after…