top of page
ALL POSTS
GlassWorm Attack Exploits Stolen GitHub Tokens to Infiltrate Python Repositories
Key Findings * GlassWorm malware campaign targeting Python repositories * Attackers use stolen GitHub tokens to force-push malicious code * Targets Python projects including Django apps, ML code, and PyPI packages * Earliest injections traced to March 8, 2026 * Uses a new offshoot called "ForceMemo" * Leverages malicious VS Code and Cursor extensions to steal credentials * Payload includes cryptocurrency theft and data exfiltration capabilities Background The GlassWorm attack
Mar 162 min read
FBI Investigates Malware Distribution Through Steam Games
Key Findings * FBI investigating malware spread through eight Steam games * Timeframe of infection: May 2024 to January 2026 * Games include BlockBlasters, Chemia, Dashverse/DashFPS, Lampy, Lunara, PirateFi, and Tokenova * Investigation focuses on cryptocurrency theft and account hijacking * Victims invited to voluntarily provide information to aid investigation Background The FBI's Seattle Division has launched a comprehensive investigation into malicious Steam games that ha
Mar 162 min read
Payload Ransomware Claims the Hack of Royal Bahrain Hospital
Key Findings Payload Ransomware claims to have breached Royal Bahrain Hospital (RBH) 110 GB of data allegedly stolen Threat to release data if ransom not paid by March 23, 2026 Attack targets a healthcare facility serving multiple Middle Eastern countries Background Royal Bahrain Hospital, established in 2011, is a 70-bed healthcare facility providing comprehensive medical services including surgery, maternity care, and diagnostics. Located in Bahrain, the hospital serves pat
Mar 151 min read
OpenClaw AI Agent Vulnerabilities: Prompt Injection and Data Exfiltration Risks
Here's the markdown-formatted article based on the source material: Key Findings OpenClaw AI agent has multiple critical security vulnerabilities Prompt injection attacks can lead to data exfiltration and unauthorized system access Chinese authorities have moved to restrict OpenClaw usage in government and military environments Malicious actors are exploiting the platform's popularity to distribute malware Background OpenClaw is an open-source, self-hosted autonomous AI agent
Mar 152 min read
Divine Skins - Breached Accounts Exposed
Key Findings * Divine Skins data breach exposed 105,814 user accounts * Unauthorized third party accessed systems and deleted all skins from database * Exposed data included email addresses, usernames, and purchase history * Breach disclosed via Discord server in March 2026 Background Divine Skins is a custom League of Legends skin service that allows players to modify their in-game character appearances. The platform has been operating for several years, providing unique cos
Mar 151 min read
GlassWorm Campaign Exploits 72 VSX Extensions in Developer Supply-Chain Attack
Key Findings * GlassWorm campaign identified targeting developers through 72 malicious Open VSX extensions * Uses sophisticated supply-chain attack technique exploiting extension dependencies * Targets development environments to steal secrets and compromise systems * Employs advanced obfuscation and evasion techniques * Spans multiple platforms including Open VSX, GitHub, and npm registries Background The GlassWorm campaign represents an evolving threat in software supply ch
Mar 152 min read
AI-Powered Slopoly Malware Enables Hive0163's Advanced Ransomware Strategy
Key Findings Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks PowerShell backdoor likely generated using a large language model (LLM) Malware maintains C2 access, collects system data, and executes remote commands Part of a broader attack framework involving NodeSnake and Interlock RAT Initial access achieved through social engineering and malvertising Background Hive0163 is a financially motivated threat actor specializing in post-comprom
Mar 132 min read
Nine Linux AppArmor Flaws in CrackArmor Enable Root Escalation, Container Isolation Bypass
Key Findings * Nine critical vulnerabilities discovered in Linux AppArmor security module * Enables root escalation and container isolation bypass * Affects Linux kernels since version 4.11 * Impacts over 12.6 million enterprise Linux instances * Allows unprivileged users to manipulate security profiles * Can trigger denial-of-service attacks * Enables arbitrary code execution within kernel * No CVE identifiers assigned yet * Vulnerabilities exist since 2017 Background AppArm
Mar 132 min read
Cloudflare Human Check Exploited by Hackers to Conceal Microsoft 365 Phishing Sites
Key Findings * Attackers are exploiting Cloudflare's human verification system to hide phishing pages * Custom virtual machine function used to obfuscate malicious code * Targets Microsoft 365 login credentials * Employs sophisticated evasion techniques against security scanners * Uses location-based filtering to block security researchers Background Cybercriminals have developed an innovative method of hiding phishing websites by leveraging Cloudflare's Turnstile verificatio
Mar 132 min read
Apple Releases Critical Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
Key Findings Apple released security updates for older iOS and iPadOS versions to address vulnerabilities in the Coruna exploit kit Updates cover devices that cannot upgrade to the latest iOS versions Patches address multiple vulnerabilities, including WebKit and kernel-related issues Coruna exploit kit targets iOS versions 13.0 through 17.2.1 with 23 total exploits Background The Coruna exploit kit, also known as CryptoWaters, was first identified by Google's Threat Intellig
Mar 122 min read
CISA Warns of Actively Exploited n8n Remote Code Execution Vulnerability Affecting 24,700 Instances
Key Findings * Critical remote code execution vulnerability in n8n workflow platform * CVE-2025-68613 added to CISA's Known Exploited Vulnerabilities (KEV) catalog * 24,700 unpatched instances exposed online * Vulnerability allows authenticated attackers to execute arbitrary code * FCEB agencies ordered to patch by March 25, 2026 Background n8n is an open-source workflow automation platform that allows users to connect different applications and services. The vulnerability ex
Mar 121 min read
Iran-Linked Handala Hackers Escalate Cyber Attacks on Stryker and Verifone
Key Findings * Iran-linked Handala Hack Team claims cyberattacks against Stryker Corporation and Verifone on March 11 * Stryker confirms a network disruption; Verifone denies any breach * Handala claims to have wiped 200,000 systems and extracted 50 terabytes of data from Stryker * The group alleges the attack was retaliation for a missile strike on an Iranian school * Verification of claims is ongoing and independent confirmation is pending Background The Handala Hack Team,
Mar 112 min read
Microsoft Patches 84 Flaws in April Patch Tuesday, Including Two Public Zero-Days
Key Findings Microsoft released patches for 84 new security vulnerabilities affecting various software components 8 vulnerabilities are rated Critical, and 76 are rated Important in severity 46 of the patched vulnerabilities relate to privilege escalation, followed by 18 remote code execution, 10 information disclosure, 4 spoofing, 4 denial-of-service, and 2 security feature bypass flaws 2 publicly disclosed zero-days are included: CVE-2026-26127 (CVSS 7.5) - Denial-of-servic
Mar 112 min read
AI Bot Hackerbot-Claw Hits GitHub Repos of Microsoft, DataDog, and CNCF
Key Points Hackerbot-Claw, a new AI-powered threat, executed a 37-hour campaign targeting major GitHub repositories, including those of Microsoft and DataDog. The attacks focused on exploiting CI/CD pipelines, allowing the AI agent to manipulate developer tools within minutes. The campaign resulted in the deletion of 97 software releases and 32,000 stars from Aqua Security's Trivy project. Hackerbot-Claw employed social engineering tactics to trick developer assistants like C
Mar 102 min read
How AI Assistants are Redefining the Security Landscape
Key Findings AI-based assistants ("agents") are growing in popularity, with the new OpenClaw AI assistant seeing rapid adoption OpenClaw and other AI assistants can automate virtually any task, accessing the user's computer, files, online services, and integrations Poorly secured AI assistants pose significant risks to organizations, with examples of AI agents accidentally deleting data or being exposed to the internet Attacking misconfigured AI agent web interfaces can allow
Mar 82 min read
Hackers Abuse Red Alert App to Spy on Israeli Users
Key Findings Deceptive mobile campaign discovered targeting people in Israel using a fake version of the popular "Red Alert" life-saving app The app appears to be a modified version of the legitimate "Red Alert" app, which is widely used to provide real-time warnings about incoming rockets The attack starts with a simple text message claiming there is a technical problem with the current alert system and providing a link to download an updated version Background The "Red Aler
Mar 82 min read
FBI Investigating Breach of Sensitive Surveillance System
Key Findings The FBI is investigating suspicious cyber activity affecting an internal system that stores sensitive data tied to surveillance operations and investigations. The affected system is unclassified but contains law enforcement-sensitive information, including data from legal tools like pen register and trap-and-trace orders, and personally identifiable information linked to investigations. The FBI has identified and addressed the suspicious activities, using all ava
Mar 72 min read
OpenAI Codex Security Agent Scans Millions of Commits, Uncovers High-Severity Issues
Key Findings OpenAI has launched Codex Security, an AI-powered security agent designed to find, validate, and propose fixes for software vulnerabilities. Over the last 30 days, Codex Security has scanned more than 1.2 million commits across external repositories, identifying 792 critical and 10,561 high-severity findings. The vulnerabilities found include issues in various open-source projects like OpenSSH, GnuTLS, GOGS, Thorium, libssh, PHP, and Chromium. Codex Security leve
Mar 72 min read
Microsoft says North Korea is using AI-powered fake IT workers to scale up scams
Key Findings North Korean threat groups are using artificial intelligence (AI) tools to accelerate and expand the country's long-running scheme to get remote technical workers hired at global companies. AI services are empowering North Korean operatives across the attack lifecycle, turning AI into a "force multiplier" for their efforts. Threat groups are using AI to shorten the time it takes to create digital personas for specific job markets and roles, leveraging financial o
Mar 73 min read
Google GTIG Reveals 90 Zero-Day Flaws Exploited in 2025, Underscoring Increasing Attacks on Enterprise Targets
Key Findings Google's Threat Intelligence Group (GTIG) identified 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024 Nearly half of the flaws (43, or 48%) targeted enterprise technologies, marking a record share and confirming a shift toward enterprise-focused attacks Browser exploitation declined to historic lows, while operating system flaws were increasingly abused Nation-state actors mainly targeted edge devices and security appliances, while co
Mar 62 min read
bottom of page
