SolarWinds Web Help Desk Exploitation
09
Mar
2026

SolarWinds Web Help Desk Exploitation

Summary On February 6, 2026, Microsoft reported the exploitation of SolarWinds Web Help Desk (WHD) servers The exploitation facilitated multi-stage…

Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale
09
Mar
2026

Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale

Pakistan-based threat actor APT36, widely known as Transparent Tribe, has shifted away from carefully crafted tools to a new approach…

Hiding payloads in Java source code strings
09
Mar
2026

Hiding payloads in Java source code strings

In this post we’ll show you how Java handles unicode escapes in source code strings in a way you might…

ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions
09
Mar
2026

ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions

ClipXDaemon is a new Linux malware family that hijacks cryptocurrency clipboard data in X11 sessions, operating fully offline without any…

09
Mar
2026

Fake Claude Code install pages highlight rise of “InstallFix” attacks

Users looking for Anthropic’s Claude Code agentic AI coding tool are being tricked via fake Claude Code install pages into…

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
09
Mar
2026

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a…

Harvey Nash docuseries addresses AI skills ‘paradox’
09
Mar
2026

Harvey Nash docuseries addresses AI skills ‘paradox’

Artificial intelligence (AI) is a rapidly growing technology, becoming more embedded in society and business every day, but is the…

4 best practices to get IAM implementation right the first time
09
Mar
2026

4 best practices to get IAM implementation right the first time

Congrats—you got the green light to move forward with improving identity access management (IAM). While you realize this is great…

We've seen ransomware cost American lives. Here's what it will actually take to stop it.
09
Mar
2026

We’ve seen ransomware cost American lives. Here’s what it will actually take to stop it.

Flights canceled. Emergency rooms shut down. Centuries-old companies shuttered. Ransomware and other similar cyberattacks have become so routine that even…

European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA
09
Mar
2026

European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA

The European Commission has prepared a Communication providing practical guidance on applying the Cyber Resilience Act (CRA). It will help…

Graphic illustrating the levels of exposure management maturity.
09
Mar
2026

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

Effective exposure management begins by illuminating and hardening risks across the entire attack surface. Some of the most meaningful shifts…

Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams
09
Mar
2026

Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams

Every security professional knows the drill. You go home for the holidays and, without volunteering, you become the family’s help…