Cybersecurity shifts toward hardware trust, AI-driven defense, network visibility, and human risk as attackers move faster ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
Ilya Lichtenstein, convicted in the 2016 Bitfinex bitcoin hack, was released early to home confinement under the First Step ...
VVS Stealer is a Python-based malware sold on Telegram that steals Discord tokens, browser data, and credentials using heavy ...
Deepfake-driven hiring fraud is rising, with fake employees gaining access, stealing data, and evading detection across ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
A new Shai-Hulud npm strain and a fake Jackson Maven package show how attackers abuse trusted dependencies to steal secrets ...
A China-linked threat actor used malicious browser extensions over seven years to steal data and corporate intelligence from ...
The first ThreatsDay Bulletin of 2026 tracks GhostAd adware, macOS malware, proxy botnets, cloud exploits, and more emerging ...
The U.S. Treasury has removed three individuals linked to Intellexa and Predator spyware from its sanctions list, without ...
This weekly recap brings those stories together in one place. No overload, no noise. Read on to see what shaped the threat ...
Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results