Microsoft has warned of a fast-moving ransomware campaign driven by the threat group Storm-1175. The attackers … Storm-1175 Exploits 0-Days to Deploy Medusa Ransomware in 24 Hours Read more
credential theft
36 Malicious npm Strapi Packages Used in Targeted Supply Chain Attack
A sophisticated software supply chain attack has been discovered targeting developers using Strapi. Attackers published 36 … 36 Malicious npm Strapi Packages Used in Targeted Supply Chain Attack Read more
Backdoored Telnyx Python SDK on PyPI Steals Credentials Across Platforms
A new software supply chain attack has targeted developers after threat actors compromised the Telnyx Python … Backdoored Telnyx Python SDK on PyPI Steals Credentials Across PlatformsRead more
Copyright-Themed Lures Deliver Multi-Stage PureLog Stealer
A new credential theft campaign is leveraging copyright violation lures to distribute PureLog Stealer, a multi-stage … Copyright-Themed Lures Deliver Multi-Stage PureLog StealerRead more
Perseus Android Malware: Full Device Takeover & Note Theft Explained
Mobile banking malware continues to evolve, but the Perseus Android malware represents a significant escalation in … Perseus Android Malware: Full Device Takeover & Note Theft ExplainedRead more
Trivy Supply Chain Attack Enables CI/CD Credential Theft
Supply chain attacks targeting developer tools are becoming one of the most dangerous threats in modern … Trivy Supply Chain Attack Enables CI/CD Credential TheftRead more
FortiGate Firewalls Exploited in Widespread Attacks to Breach Networks and Steal Credentials
LangSmith, the AI observability platform behind many enterprise LLM stacks, ingests over one billion events per … FortiGate Firewalls Exploited in Widespread Attacks to Breach Networks and Steal CredentialsRead more
Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against Enterprises
In late 2025 and early 2026, security researchers began observing a surge in double‑extortion ransomware attacks … Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against EnterprisesRead more
DarkCloud Infostealer: Scalable Credential Theft Threat
In 2026, DarkCloud Infostealer has become a defining example of how scalable credential theft is reshaping … DarkCloud Infostealer: Scalable Credential Theft ThreatRead more
Malicious Next.js Repositories Target Developers
Software supply chain attacks are no longer limited to package managers or CI/CD pipelines. Threat actors … Malicious Next.js Repositories Target DevelopersRead more