npm package preinstall script
08
Mar
2026

New malicious npm package ‘ambar-src’ targets developers with open source malware

Tenable Research investigated a malicious npm package with around 50,000 downloads in the public registry. We observed various detection-evasion techniques…

Repeater Strike: manual testing, amplified
08
Mar
2026

Repeater Strike: manual testing, amplified

Manual testing doesn’t have to be repetitive. In this post, we’re introducing Repeater Strike – a new AI-powered Burp Suite…

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
08
Mar
2026

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Ravie LakshmananMar 04, 2026Threat Intelligence / Application Security Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 87
08
Mar
2026

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 87

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

breaking defender with symlink post logo
08
Mar
2026

Break The Protective Shell Of Windows Defender With The Folder Redirect Technique

I. INTRO During penetration testing or red team activities, the attackers are constantly pursued by Antivirus and Endpoint Detection and…

Challenges and projects for the CISO in 2026
08
Mar
2026

Challenges and projects for the CISO in 2026

Sophisticated attacks and the incorporation of AI tools, talent shortages, and tight budgets are some of the challenges commonly cited…

Malicious packages for dYdX cryptocurrency exchange empties user wallets
08
Mar
2026

Malicious packages for dYdX cryptocurrency exchange empties user wallets

Open source packages published on the npm and PyPI repositories were laced with code that stole wallet credentials from dYdX…

Figure 1: Decision-making process for scaling an Active Directory implementation
08
Mar
2026

Explore scaling options for AWS Directory Service for Microsoft Active Directory

You can use AWS Directory Service for Microsoft Active Directory as your primary Active Directory Forest for hosting your users’…

Matt Kapko
08
Mar
2026

Global coalition dismantles Tycoon 2FA phishing kit

Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle…

They Got In Through SonicWall. Then They Tried to Kill Every Security Tool
08
Mar
2026

They Got In Through SonicWall. Then They Tried to Kill Every Security Tool

Summary In early February 2026, Huntress responded to an intrusion where threat actors leveraged compromised SonicWall SSLVPN credentials to gain…

Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
08
Mar
2026

Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling

Sometimes people think they’ve found HTTP request smuggling, when they’re actually just observing HTTP keep-alive or pipelining. This is usually…

New RFP Template for AI Usage Control and AI Governance 
08
Mar
2026

New RFP Template for AI Usage Control and AI Governance 

The Hacker NewsMar 04, 2026Artificial Intelligence / SaaS Security As AI becomes the central engine for enterprise productivity, security leaders…