Threat actors use custom AuraInspector to harvest data from Salesforce systems
Threat actors use custom AuraInspector to harvest data from Salesforce systems Pierluigi Paganini March 10, 2026 Attackers are mass-scanning Salesforce...
Threat actors use custom AuraInspector to harvest data from Salesforce systems Pierluigi Paganini March 10, 2026 Attackers are mass-scanning Salesforce...
The highly popular and risk-riddled OpenClaw personal AI assistant is being used by bad actors to target users with...
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support...
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular...
Ravie LakshmananFeb 27, 2026Endpoint Security / Windows Security Threat actors are luring unsuspecting users into running trojanized gaming utilities that...
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious...
Ravie LakshmananFeb 20, 2026Vulnerability / Cyber Attack Threat actors have been observed exploiting a recently disclosed critical security flaw impacting...
Ravie LakshmananFeb 13, 2026Malware / Critical Infrastructure Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea,...
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote...
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law...
Ravie LakshmananFeb 03, 2026Open Source / Vulnerability Threat actors have been observed exploiting a critical security flaw impacting the Metro...
Nation-state and criminal actors leverage WinRAR flaw in attacks Pierluigi Paganini January 29, 2026 Multiple threat actors exploited a now-patched...
Based on its geofencing behavior, we assess that the threat actors are likely of Russian origin, or those from the...
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion Pierluigi Paganini January 20, 2026 Threat actors use...
The North Korean threat actors associated with the long-running Contagious Interview campaign have been observed using malicious Microsoft Visual Studio...