• Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

    Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

    A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses. The crackdown was led by the Dubai Police, under the United Arab Emirates (UAE) Ministry of Interior, in partnership…

    Read More

  • CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

    CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow…

    Read More

  • Trellix Confirms Source Code Breach With Unauthorized Repository Access

    Trellix Confirms Source Code Breach With Unauthorized Repository Access

    Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a “portion” of its source code. It said it “recently identified” the compromise of its source code repository and that it began working with “leading forensic experts” to resolve the matter immediately. It also said it has notified law enforcement…

    Read More

  • 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

    30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

    A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a “phishing relay” to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed AccountDumpling by Guardio, with the scheme selling the stolen accounts back through an illicit storefront run by the threat actors. In all, roughly…

    Read More

  • Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

    Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

    Cybersecurity researchers are warning of two cybercrime groups that are carrying out “rapid, high-impact attacks” operating almost within the confines of SaaS environments, while leaving minimal traces of their actions. The clusters, Cordial Spider (aka BlackFile, CL-CRI-1116, O-UNC-045, and UNC6671) and Snarky Spider (aka O-UNC-025 and UNC6661), have been attributed to high-speed data theft and

    Read More

  • Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

    Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

    The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the fastest-growing sector[2]. Despite this opportunity, many MSPs leave revenue on the table because their go-to-market strategy fails to connect technical expertise with business needs. This execution gap is where most deals stall.…

    Read More

  • Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence. The activity has been attributed to the GitHub account “BufferZoneCorp,” which has published a set of repositories that are associated with malicious Ruby gems…

    Read More

  • PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

    PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

    In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is…

    Read More

  • ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

    ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

    The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target.…

    Read More

  • New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. “The intrusion chain begins with execution of a batch script (‘install_obf.bat’) that disables Windows security controls, dynamically extracts an

    Read More