top of page
ALL POSTS
CISA Adds TrueConf Client Vulnerability to Known Exploited Vulnerabilities Catalog
Key Findings CISA added CVE-2026-3502, a flaw in TrueConf Client, to its Known Exploited Vulnerabilities catalog on April 2, 2026 The vulnerability has a CVSS score of 7.8 and allows attackers to download and install malicious updates without integrity verification Threat actors are actively exploiting this flaw by compromising TrueConf servers and replacing legitimate update files with malicious payloads Check Point researchers attributed a wave of attacks called Operation T
Apr 53 min read
Qilin Ransomware Group Claims Hack of German Political Party Die Linke
Key Findings Qilin ransomware group claims to have breached Die Linke, Germany's left-wing political party, and posted the claim on its Tor data leak site on April 1, 2026 Die Linke discovered the attack on March 27 and confirmed the incident but has not verified whether data was actually stolen The party's membership database was not compromised and no member data was accessed Qilin has provided no proof of the breach despite making the claim Qilin is one of the most prolifi
Apr 52 min read
36 Malicious npm Packages Deploy Redis and PostgreSQL Persistent Implants
Key Findings 36 malicious npm packages masquerading as Strapi CMS plugins uploaded by four sock puppet accounts over 13 hours Eight distinct payload variants reveal real-time attack development against a specific target Exploitation chain includes Redis RCE, PostgreSQL database theft, Docker container escape, and persistent C2 implants Packages target cryptocurrency platform infrastructure with hardcoded database credentials and wallet-specific data harvesting Postinstall scr
Apr 54 min read
UNC1069 Targets Node.js Maintainers Through Fraudulent Social Media Profiles
Key Findings North Korean threat group UNC1069 is conducting coordinated social engineering campaigns against open source maintainers, particularly those managing Node.js and npm packages Attackers use fake LinkedIn profiles, Slack messages, and spoofed video conferencing platforms to build rapport over weeks before delivering remote access trojans Goal is to compromise maintainer credentials and gain write access to popular packages, allowing injection of malicious code into
Apr 43 min read
North Korean Cyber Espionage Campaign Exploits GitHub to Target South Korean Enterprises
Key Findings North Korean state-sponsored hackers are running a sophisticated spying campaign against South Korean companies dating back to 2024 Attackers use seemingly harmless LNK shortcut files that trigger hidden PowerShell scripts to steal system data from Windows machines GitHub repositories are being abused as command and control infrastructure to exfiltrate stolen information while bypassing corporate security systems The malware evades detection by checking for secur
Apr 43 min read
Crunchyroll Data Breach Impacts Nearly 1.2 Million Accounts
Key Findings Crunchyroll experienced a data breach in March 2026 affecting approximately 6.8 million users Attackers gained unauthorized access to the company's Zendesk support system Exposed data included names, login credentials, email addresses, IP addresses, geographic location data, and support ticket contents A subset of 1.2 million email addresses from a larger 2 million record dataset was later provided to Have I Been Pwned 1,195,684 breached accounts were confirmed i
Apr 42 min read
North Korean-Linked Hackers Drain $285M From Drift Protocol in Sophisticated Exploit
Key Findings Drift Protocol lost $285 million in a sophisticated attack attributed to North Korean-linked hackers on April 1, 2026 Attackers used durable nonce accounts to pre-sign transactions and compromised multisig approvals to gain admin control The operation involved multi-week preparation with staged execution across multiple phases Stolen funds were rapidly drained from multiple vaults within seconds and laundered across wallets This marks the 18th confirmed North Kor
Apr 33 min read
Drift's $285 Million Durable Nonce Hack: DPRK-Linked Social Engineering Attack Raises Questions About Protocol Security
Key Findings Drift Protocol, a Solana-based decentralized exchange, lost approximately $285 million on April 1, 2026 in a sophisticated social engineering attack Attackers exploited durable nonce mechanisms to obtain unauthorized multisig approvals and gain control of the Security Council administrative powers The attack involved multi-week preparation starting as early as March 23, 2026, with staged execution and pre-signed transactions Threat actors created a fictitious ass
Apr 33 min read
Massive CVE-2025-55182 Exploit Campaign Compromises 766 Next.js Servers in Credential Theft Attack
Key Findings At least 766 Next.js hosts across multiple geographic regions and cloud providers compromised through CVE-2025-55182 exploitation Threat cluster UAT-10608 attributed to the campaign by Cisco Talos Critical vulnerability (CVSS 10.0) in React Server Components and Next.js App Router enables remote code execution NEXUS Listener framework deployed post-compromise to harvest and exfiltrate credentials via web-based GUI Stolen data includes database credentials, SSH ke
Apr 32 min read
ShinyHunters Claims Theft of 3M+ Cisco Records in Latest Breach Threat
Key Findings ShinyHunters has issued a final warning to Cisco with an April 3, 2026 deadline before publicly leaking over 3 million alleged stolen records The group claims access through three separate breach paths: UNC6040, Salesforce Aura, and compromised AWS accounts Stolen data includes personally identifiable information, GitHub repositories, AWS storage buckets, and internal corporate data Screenshots provided by the group show access to AWS organizational dashboards an
Apr 22 min read
Apple Expands iOS 18 Updates Across Multiple Devices to Block Critical DarkSword Exploit
Key Findings Apple expanded iOS 18.7.7 availability on April 1, 2026 to protect users from the DarkSword exploit kit, which targets iOS versions 18.4 through 18.7 The update now covers iPhone XR through iPhone 16e and multiple iPad models, allowing users to patch vulnerabilities without upgrading to iOS 26 DarkSword spreads through watering hole attacks on compromised legitimate websites and can deploy backdoors and data miners for persistent access Approximately 20% of users
Apr 23 min read
WhatsApp Warns 200 Users of Fake iOS App with Government Spyware Linked to Italian Vendor
Key Findings WhatsApp alerted approximately 200 users, primarily in Italy, who were tricked into installing a counterfeit iOS app containing spyware The fake app was created by Asigint, an Italian subsidiary of spyware company SIO Spa All affected users have been logged out and advised to uninstall the malicious app and download the official version WhatsApp is pursuing legal action against Asigint to stop further malicious activity The attack relied on social engineering tac
Apr 22 min read
Microsoft Warns of WhatsApp-Delivered VBS Malware with Windows UAC Bypass Vulnerability
Key Findings New malware campaign since late February 2026 distributes malicious VBS files through WhatsApp messages Attack chain uses renamed Windows utilities and legitimate cloud services to evade detection Malware exploits UAC bypass techniques to gain elevated privileges and install remote access tools like AnyDesk Campaign combines social engineering, living-off-the-land tactics, and registry manipulation for persistence Background Microsoft's Defender Security Research
Apr 22 min read
Google Patches Fourth Actively Exploited Chrome Zero-Day Vulnerability in 2026
Key Findings Google patched CVE-2026-5281, a use-after-free vulnerability in the WebGPU Dawn component that is actively being exploited This marks the fourth Chrome zero-day under active exploitation in 2026 Users are urged to update immediately to Chrome 146.0.7680.177/178 (Windows/macOS) or 146.0.7680.177 (Linux) The vulnerability affects graphics processing capabilities and could allow attackers to execute malicious code or crash the browser Google withheld technical explo
Apr 12 min read
Anthropic Leaks 512,000 Lines of Claude Source Code in Security Blunder
Key Findings Anthropic leaked approximately 512,000 lines of Claude Code source code through a misconfigured npm source map file on March 31, 2026 The leak was discovered within hours by an intern at Solayer Labs and rapidly mirrored across the internet Claude Code generates $2.5 billion annually, representing a significant portion of Anthropic's $19 billion total revenue The exposed code reveals proprietary solutions including a three-layer memory system designed to prevent
Apr 13 min read
Google Attributes Axios npm Supply Chain Attack to North Korean APT UNC1069
Key Findings Google Threat Intelligence Group attributed the Axios npm supply chain attack to UNC1069, a financially motivated North Korean threat group active since at least 2018 Attackers compromised maintainer Jason Saayman's npm account and published two malicious Axios versions (1.14.1 and 0.30.4) within an hour The attack injected a malicious dependency called "plain-crypto-js" that deployed a cross-platform remote access trojan targeting Windows, macOS, and Linux Given
Apr 13 min read
Claude Source Code Accidentally Leaked Through NPM Package Error
Key Findings Anthropic confirmed Claude Code source code was accidentally exposed via npm package version 2.1.88 due to human error in packaging, not a security breach Nearly 2,000 TypeScript files and over 512,000 lines of code were leaked through a source map file and quickly spread across public repositories The leaked codebase revealed advanced features including KAIROS autonomous daemon mode, self-healing memory architecture, Undercover Mode for stealth contributions, an
Apr 13 min read
TrueConf Zero-Day Vulnerability Exploited in Targeted Attacks Against Southeast Asian Government Infrastructure
Key Findings High-severity zero-day vulnerability CVE-2026-3502 (CVSS 7.8) in TrueConf video conferencing software exploited against Southeast Asian government networks in campaign dubbed TrueChaos Flaw allows attackers controlling on-premises TrueConf servers to distribute tampered updates and execute arbitrary code on all connected endpoints Patched in TrueConf Windows client version 8.5.3 released earlier this month Campaign attributed with moderate confidence to Chinese-n
Mar 312 min read
# Critical Supply Chain Attack: Axios npm Account Compromised to Distribute Cross-Platform RAT Malware
Key Findings Attackers compromised the npm account of Axios maintainer Jason Saayman and published malicious versions 1.14.1 and 0.30.4 containing a hidden RAT malware dependency The malicious versions injected "plain-crypto-js@4.2.1" as a fake dependency that deploys cross-platform remote access trojans targeting Windows, macOS, and Linux Both poisoned versions were published within 39 minutes on March 31, 2026, bypassing GitHub Actions CI/CD verification through compromised
Mar 313 min read
AI Agents: Democratizing Finance While Redefining Risk
Key Findings AI agents are moving capital autonomously across crypto markets, enabling retail users to execute sophisticated trading strategies previously requiring institutional infrastructure A documented case shows $300 converted to $2.3 million in four months through agent-executed strategies Agents operate without human approval at each step, fundamentally different from traditional finance architecture Critical security vulnerability exists: agents must access private k
Mar 315 min read
bottom of page
