• UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

    UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

    A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT helpdesk employees, convincing their victim to accept a Microsoft Teams chat invitation from…

    Read More

  • Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

    Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

    Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from Socket. “The affected package version appears to be @bitwarden/[email protected], and the malicious code was published in ‘bw1.js,’ a file included in the package contents,” the application security company said. “The attack appears to…

    Read More

  • [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

    [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

    Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We…

    Read More

  • China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared…

    Read More

  • Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

    Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

    Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction. “Notifications marked for deletion could be…

    Read More

  • HD 52 Candidate David Osborn’s Campaign To Reach All of Hood River in a Day

    HD 52 Candidate David Osborn’s Campaign To Reach All of Hood River in a Day

    Joined by Senator Khanh Pham and Grassroots Organizations in Push to Engage Voters

    Read More

  • Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

    Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

    Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official…

    Read More

  • Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

    Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

    Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of…

    Read More

  • Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

    Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

    The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. “The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses,” the…

    Read More

  • Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky. “Two…

    Read More