News

DarkSword iOS Exploit Chain: Six CVEs, Three Zero-Days, Full Device Takeover

DarkSword is a full-chain iOS exploit kit using six CVEs—three zero-days—to silently take over iPhones running iOS 18.4–18.6.2. Patch to iOS 18.7.7 now.

Read More
News

CVE-2026-0073: Critical Android RCE Flaw Affects Android 14 Through 16

CVE-2026-0073 is a critical zero-click RCE in Android's System component affecting Android 14–16. Google's May 2026 patch fixes the flaw. Update now.

Read More
News

2026 FIFA World Cup Scam Economy: Fake Visas, Counterfeit Tokens, Phishing

Malwarebytes documents a four-part 2026 FIFA World Cup scam ecosystem already operating: fake $270 US entry visas, unlicensed crypto tokens, counterfeit merchandise, and

Read More
News

DHS Used Administrative Subpoenas to Force Google and Meta to Reveal Anti-ICE Users

DHS has issued hundreds of administrative subpoenas to Google, Meta, Reddit, and Discord to unmask users who criticized ICE online. Google, Meta, and

Read More
News

APT28 Targets Western Logistics and Tech Firms Supporting Ukraine Aid

Russia's GRU Unit 26165 (APT28) has been hacking Western logistics, defense, and tech companies since 2022 using HEADLACE malware, IP cameras, and CVE-2023-23397.

Read More
News

CVE-2024-36401: GeoServer RCE Exploited at US Federal Agency — CISA IR Lessons

CISA advisory AA25-266A details how CVE-2024-36401, a CVSS 9.8 GeoServer RCE, was exploited at a US federal agency for three weeks before detection.

Read More
Blog

Ruby Gem Supply Chain Attack Detection: CI Checklist for Sleeper Packages

The BufferZoneCorp campaign used sleeper Ruby gems and Go modules to steal credentials and tamper with GitHub Actions. Detection checklist and CI hardening

Read More
Blog

npm Supply Chain Attack Audit: Detect Mini Shai-Hulud in SAP, PyTorch Lightning, and Intercom Dependencies

Mini Shai-Hulud backdoored SAP CAP, PyTorch Lightning, and Intercom packages on npm and PyPI. Use this checklist to detect compromise and harden your

Read More
Blog

EDR Vendor Breach Downstream Risk: Responding When Your Security Tool Is Compromised

Trellix confirmed a source code breach. Assess EDR vendor breach downstream risk, audit agent update channels, and decide whether to quarantine.

Read More
News

Amazon SES Increasingly Abused in Phishing Attacks That Bypass Security Filters

Attackers are stealing exposed AWS IAM keys to send convincing phishing emails via Amazon SES, bypassing reputation-based filters and SPF/DKIM checks.

Read More