Axios maintainer’s post mortem confirms social engineering by UNC1069Laura FrenchApril 3, 2026Jason Saayman says he installed a remote access trojan disguised as a Teams update.
4 steps teams can take to mitigate Iranian cyberattacks on critical infrastructureBill Moore April 2, 2026
Zero trust everywhere: Redefining secure network access in a post-VPN worldPaul WagenseilApril 3, 2026
RansomwareChaos malware now targeting 64-bit Linux serversSteve ZurierApril 3, 2026Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.
RansomwareHighly evasive spear-phishing campaign targeting senior execs ‘neutralizes’ MFALaura FrenchApril 3, 2026The campaign leverages a newly-discovered phishing kit called VENOM.
Vulnerability ManagementApple expands updates to iOS 18 devices affected by DarkSword exploitSteve ZurierApril 2, 2026Experts say Apple’s move shows it understood that older iOS and iPadOS devices were vulnerable and being exploited by DarkSword.
RansomwareCampaign combines WhatsApp with legit cloud platforms to deliver malicious VBS filesSteve ZurierApril 1, 2026Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.
RansomwareVenom Stealer MaaS handles attacks from ClickFix to crypto theftLaura FrenchApril 1, 2026The stealer persists on the victim’s machine and immediately exfiltrates data with no local staging.
Vulnerability ManagementCitrix NetScaler ADC bug added to CISA list of known exploitsSteve ZurierMarch 31, 2026Security agency gives federal agencies until April 2, 2026, to make the patch.
Application securityAxios npm supply chain attack: Malicious updates add remote access trojanLaura FrenchMarch 31, 2026The axios npm package, with about 100 million weekly downloads, was compromised via a maintainer’s account.
AI/MLOpenAI fixes Codex flaw that could lead to GitHub token theftLaura FrenchMarch 31, 2026A command injection hidden in a branch name could cause an OAuth token to be exfiltrated.