Sonatype Discovers Two Malicious npm Packages
Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two...
Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two...
Ravie LakshmananMar 19, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the...
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known...
In late February 2026, SophosLabs analysts identified multiple detections on Android devices for malicious activity associated with the Keenadu backdoor....
Are Businesses Truly Prepared for the Challenges Presented by Machine Identities? Cybersecurity is constantly evolving, and one of the...
Many teams start by running Kubernetes with a few enthusiastic engineers and some shared clusters. As those clusters become...
U.S. CISA adds a flaw in Cisco FMC and Cisco SCC Firewall Management to its Known Exploited Vulnerabilities catalog Pierluigi...
Russian APT targets Ukraine via Zimbra XSS flaw CVE-2025-66376 Pierluigi Paganini March 19, 2026 Russian APT exploits a critical XSS...
DarkSword emerges as powerful iOS exploit tool in global attacks Pierluigi Paganini March 19, 2026 DarkSword, a new iOS exploit...
AUSTIN, Texas, Mar. 19, 2026, CyberNewswire—SpyCloud, the leader in identity threat protection, today released its annual 2026 Identity Exposure...
The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and...
If you run a Windows environment, you already know how critical PowerShell is. It’s the backbone of modern administration, used for...
Ravie LakshmananMar 19, 2026Cybersecurity / Hacking News ThreatsDay Bulletin is back on The Hacker News, and this week feels off...
Ravie LakshmananMar 19, 2026Malware / Mobile Security Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being...
The infection begins when the victim manually executes a file disguised as a legal notice: Dokumentation über Verstöße gegen Rechte...