A new malware campaign is targeting traders and crypto users by abusing trust in popular platforms. … Fake TradingView Premium Posts on Reddit Deliver Vidar and AMOS StealersRead more
CyberSecurity
Critical Command Injection in AI Coding Agent Exposed GitHub Tokens
The growing adoption of AI coding assistants is introducing powerful productivity gains — but also new … Critical Command Injection in AI Coding Agent Exposed GitHub TokensRead more
Storm-1175 Exploits 0-Days to Deploy Medusa Ransomware in 24 Hours
Microsoft has warned of a fast-moving ransomware campaign driven by the threat group Storm-1175. The attackers … Storm-1175 Exploits 0-Days to Deploy Medusa Ransomware in 24 Hours Read more
CISA Adds Actively Exploited TrueConf Vulnerability to KEV Catalog
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting TrueConf Client to … CISA Adds Actively Exploited TrueConf Vulnerability to KEV Catalog Read more
36 Malicious npm Strapi Packages Used in Targeted Supply Chain Attack
A sophisticated software supply chain attack has been discovered targeting developers using Strapi. Attackers published 36 … 36 Malicious npm Strapi Packages Used in Targeted Supply Chain Attack Read more
LinkedIn Browser Extension Scanning Controversy Explained
A new investigation has raised serious privacy concerns about how LinkedIn may be collecting data from … LinkedIn Browser Extension Scanning Controversy Explained Read more
Axios npm Supply Chain Attack: Detection, Risks, and Mitigation Guide
On March 31, 2026, the cybersecurity community faced a major wake-up call when a widely trusted … Axios npm Supply Chain Attack: Detection, Risks, and Mitigation Guide Read more
GitHub C2 LNK Phishing Attack Linked to North Korea
A sophisticated phishing campaign linked to North Korean threat actors is abusing GitHub as a covert … GitHub C2 LNK Phishing Attack Linked to North Korea Read more
NoVoice Android Rootkit: Detection, Risks, and Mitigation Guide
Mobile threats are evolving rapidly, and the NoVoice Android rootkit demonstrates just how stealthy modern malware … NoVoice Android Rootkit: Detection, Risks, and Mitigation Guide Read more
How Threat Intelligence Reduces SOC Escalation Rates
Security Operations Centers (SOCs) are designed to function like precision instruments, where alerts move through tiers … How Threat Intelligence Reduces SOC Escalation Rates Read more