A significant escalation in the GlassWorm cyber campaign has been identified by cybersecurity researchers, revealing…
Tag: Privacy
Alleged Administrator of Major Cybercrime Forum LeakBase Arrested in Russia Following International Takedown
Moscow, Russia – March 25, 2026 – Russian law enforcement authorities have successfully apprehended the…
FCC Imposes Sweeping Ban on New Foreign-Made Consumer Routers Citing Severe National Security Risks
The U.S. Federal Communications Commission (FCC) announced on Monday, March 25, 2026, a groundbreaking prohibition…
Gartner Publishes Inaugural Market Guide for Guardian Agents, Signaling New Era in AI Governance and Security
On February 25, 2026, the technology research giant Gartner released its inaugural Market Guide for…
LiteLLM Python Package Compromised in Sophisticated TeamPCP Supply Chain Attack, Unveiling Credential Harvesters and Kubernetes Backdoors
The prominent Python package litellm, widely utilized for interfacing with various large language model (LLM)…
Sophisticated Malvertising Campaign Exploits Tax Season Searches, Deploys Kernel-Mode EDR Killer via Vulnerable Huawei Driver.
A sophisticated malvertising campaign, active since January 2026, has been observed meticulously targeting U.S.-based individuals…
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Cybersecurity researchers have unveiled a new and highly sophisticated campaign, dubbed "Ghost" by ReversingLabs, involving…
Unmasking the AI Underbelly: XM Cyber Reveals Eight Critical Attack Vectors in AWS Bedrock
The rapid ascent of generative AI applications, particularly those powered by platforms like AWS Bedrock,…
North Korean Threat Actors Deploy StoatWaffle Malware via Malicious VS Code Projects in Evolving Cyber Espionage Campaigns
A sophisticated new malware family, dubbed StoatWaffle, has been definitively attributed to North Korean state-sponsored…
Global Cybersecurity Landscape Grapples with Escalating Threats: Trivy Supply Chain Attack Highlights Pervasive Vulnerabilities and Rapid Exploitation
The digital world remains under siege, as evidenced by a relentless barrage of sophisticated and…
