Overview Google has addressed a maximum severity security flaw in Gemini CLI (the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow) that could have allowed attackers to execute arbitrary commands on host systems. The vulnerability, which carries a CVSS score of 10.0, represents one of the most critical AI…
Overview A sophisticated, high-resilience malware campaign dubbed EtherRAT was identified by Atos Threat Research Center (TRC) in March 2026. This…
Overview In yet another wave of software supply chain attacks, threat actors have compromised the popular Python package Lightning (PyTorch…
Overview A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-31431 and dubbed “Copy Fail,” allows an unprivileged local attacker to…
Overview The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a critical Windows vulnerability, tracked…
Overview Security researchers at Securonix have uncovered a stealthy Python-based backdoor framework dubbed DEEP#DOOR that establishes persistent access on compromised…
Overview The open-source PyTorch Lightning Python framework was hit by a supply chain attack on April 30, 2026, with threat…
The attack leverages obscure programming languages, mTLS-secured C2, and Windows privilege abuse to achieve persistence and evade detection.
Attackers are shifting from cryptomining to building a multi-vector botnet that can replicate, persist, and prepare for broader attacks.
The update addresses nine critical bugs and two publicly disclosed vulnerabilities in Windows SMB and SQL Server.
The critical bug could let attackers hijack customer accounts without authentication through Adobe Commerce and Magento REST APIs.
The September fixes include a maximum-severity bug that could let attackers execute arbitrary commands via exposed SAP NetWeaver components.
The streaming service confirmed attackers accessed usernames, emails, and hashed passwords, marking the second major breach in three years.
A surge in reconnaissance activity against Cisco ASA devices may foreshadow the disclosure of a new vulnerability, researchers warn.
The attack exploited compromised maintainer accounts to silently inject malicious GitHub Actions workflows into hundreds of repositories.
Hackers infiltrated Lovesac's internal systems for over two weeks, stealing personal data and prompting a RansomHub ransomware extortion attempt.
A new phishing scheme uses legitimate Apple email infrastructure to bypass spam filters and trick victims into calling fake support numbers.
VirusTotal’s AI-enhanced detection revealed an SVG-based phishing campaign that slipped past traditional antivirus tools by disguising malicious portals as official judicial sites.
Attackers used AI prompt engineering to enhance a supply chain attack that compromised thousands of GitHub accounts and repositories through…
Newly discovered npm packages targeting Ethereum developers disguise themselves as trusted cryptographic tools while stealthily exfiltrating private keys and mnemonic…
The powerful new remote access trojan with Python and C variants shows TAG-150's growing sophistication in delivering modular, evasive malware…
A software supply chain compromise exposed sensitive personal data of Wealthsimple clients, though funds and passwords remain secure.
Even minimal project-level permissions can now unlock sensitive repository credentials in unpatched versions of the tool.
Researchers warn that unpatched systems are already being breached as attackers weaponize the flaw against exposed SAP servers.

Sign in to your account