<?xml version='1.0' encoding='utf-8'?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CSOH - Cloud Security News</title>
    <link>https://csoh.org/news.html</link>
    <description>Latest cloud security news curated by Cloud Security Office Hours. Covers AWS, Azure, GCP, Kubernetes vulnerabilities, breaches, and more.</description>
    <language>en-us</language>
    <managingEditor>admin@csoh.org (CSOH)</managingEditor>
    <webMaster>admin@csoh.org (CSOH)</webMaster>
    <lastBuildDate>Sun, 05 Apr 2026 08:35:40 +0000</lastBuildDate>
    <ttl>720</ttl>
    <atom:link href="https://csoh.org/feed.xml" rel="self" type="application/rss+xml" />
    <image>
      <url>https://csoh.org/favicon.png</url>
      <title>CSOH - Cloud Security News</title>
      <link>https://csoh.org/news.html</link>
    </image>
    <item>
      <title>Image or Malware? Read until the end and answer in comments :)</title>
      <link>https://securityaffairs.com/190358/hacking/image-or-malware-read-until-the-end-and-answer-in-comments.html</link>
      <description>A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes. I received this email from a friend to make an analysis. First, let me...</description>
      <source url="https://securityaffairs.com/190358/hacking/image-or-malware-read-until-the-end-and-answer-in-comments.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190358/hacking/image-or-malware-read-until-the-end-and-answer-in-comments.html</guid>
      <pubDate>Sun, 05 Apr 2026 08:35:40 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION</title>
      <link>https://securityaffairs.com/190368/breaking-news/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition.html</link>
      <description>A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, i...</description>
      <source url="https://securityaffairs.com/190368/breaking-news/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190368/breaking-news/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition.html</guid>
      <pubDate>Sun, 05 Apr 2026 08:29:28 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited</title>
      <link>https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited</link>
      <description>Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost of deepfake prod...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/05/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bug-exploited</guid>
      <pubDate>Sun, 05 Apr 2026 08:00:49 +0000</pubDate>
      <category>Vulnerability</category>
      <category>Identity</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Axios npm hack used fake Teams error fix to hijack maintainer account</title>
      <link>https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account</link>
      <description>The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was targeted by a social engineering campaign believed to have been conducted by North Korean...</description>
      <source url="https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account</guid>
      <pubDate>Sat, 04 Apr 2026 16:30:42 -0400</pubDate>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Device code phishing attacks surge 37x as new kits spread online</title>
      <link>https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online</link>
      <description>Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online</guid>
      <pubDate>Sat, 04 Apr 2026 10:17:38 -0400</pubDate>
      <category>Phishing</category>
    </item>
    <item>
      <title>FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)</title>
      <link>https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616</link>
      <description>Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wild. This time around, the confirmation of active exploitation...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616</guid>
      <pubDate>Sat, 04 Apr 2026 14:09:54 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>European Commission breach exposed data of 30 EU entities, CERT-EU says</title>
      <link>https://securityaffairs.com/190333/security/european-commission-breach-exposed-data-of-30-eu-entities-cert-eu-says.html</link>
      <description>CERT-EU says a European Commission cloud hack exposed data from 30 EU entities and links the breach to the TeamPCP group. CERT-EU attributed a European Commission cloud breach to the TeamPCP threat group, revealing th...</description>
      <source url="https://securityaffairs.com/190333/security/european-commission-breach-exposed-data-of-30-eu-entities-cert-eu-says.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190333/security/european-commission-breach-exposed-data-of-30-eu-entities-cert-eu-says.html</guid>
      <pubDate>Sat, 04 Apr 2026 08:45:04 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>Elastic Security Integrations Roundup: Q1 2026</title>
      <link>https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</link>
      <description>Elastic Security Labs announces nine new integrations for Elastic Security spanning cloud security, endpoint visibility, email threat detection, identity and SIEM.</description>
      <source url="https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/elastic-security-integrations-roundup-q1-2026</guid>
      <pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate>
      <category>Identity</category>
    </item>
    <item>
      <title>Friday Squid Blogging: Jurassic Fish Chokes on Squid</title>
      <link>https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html</link>
      <description>Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum : the hard, internal shell of an extinct, squid-like animal. Original paper . As usual, you can also use this squid post to ta...</description>
      <source url="https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html</guid>
      <pubDate>Fri, 03 Apr 2026 21:07:06 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</title>
      <link>https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks</link>
      <description>Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks</guid>
      <pubDate>Fri, 03 Apr 2026 10:05:15 -0400</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>North Korea–linked hackers drain $285M from Drift in sophisticated attack</title>
      <link>https://securityaffairs.com/190330/hacking/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack.html</link>
      <description>Drift lost $285M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a $285 million cryptocurrency heist in a highly sophisticated attac...</description>
      <source url="https://securityaffairs.com/190330/hacking/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190330/hacking/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack.html</guid>
      <pubDate>Fri, 03 Apr 2026 13:57:51 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication</title>
      <link>https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication</link>
      <description>"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.</description>
      <source url="https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/remote-workforce/skull-vibrations-could-be-xr-headset-authentication</guid>
      <pubDate>Fri, 03 Apr 2026 13:30:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access</title>
      <link>https://securityaffairs.com/190310/cyber-crime/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access.html</link>
      <description>CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims. In March 2026, Kaspersky researchers uncovered a Telegram-based campaign promotin...</description>
      <source url="https://securityaffairs.com/190310/cyber-crime/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190310/cyber-crime/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access.html</guid>
      <pubDate>Fri, 03 Apr 2026 13:23:57 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000&amp;#x2b; SaaS Environments, (Fri, Apr 3rd)</title>
      <link>https://isc.sans.edu/diary/rss/32864</link>
      <description>This is the sixth update to the TeamPCP supply chain campaign threat intelligence report,&amp;#;x26;#;xc2;&amp;#;x26;#;xa0;"When the Security Scanner Became the Weapon"&amp;#;x26;#;xc2;&amp;#;x26;#;xa0;(v3.0, March 25, 2026).&amp;#;x26;#...</description>
      <source url="https://isc.sans.edu/diary/rss/32864">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32864</guid>
      <pubDate>Fri, 03 Apr 2026 13:18:01 +0000</pubDate>
      <category>Breach</category>
      <category>Supply Chain</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Claude Source Code Leak Highlights Big Supply Chain Missteps</title>
      <link>https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight</link>
      <description>Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.</description>
      <source url="https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/application-security/source-code-leaks-highlight-lack-supply-chain-oversight</guid>
      <pubDate>Fri, 03 Apr 2026 13:00:00 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)</title>
      <link>https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093</link>
      <description>Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an unauthenticated, remote attacker to bypass authentication and gain a...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093</guid>
      <pubDate>Fri, 03 Apr 2026 12:59:22 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</title>
      <link>https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain</link>
      <description>The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open source artifacts across containers, libraries, agent skills, and GitHub Actions.</description>
      <source url="https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/application-security/chainguard-factory-automate-hardening-software-supply-chain</guid>
      <pubDate>Fri, 03 Apr 2026 12:57:28 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Orca Security Featured in SACR’s 2026 Unified Agentic Defense Platforms Report</title>
      <link>https://orca.security/resources/blog/unified-agentic-defense-platforms-sacr-report</link>
      <description>Software Analyst Cyber Research (SACR) has published its report, The Convergence of AI and Data Security: An Industry-Wide Technoscope of Unified Agentic Defense Platforms. In this evaluation of 15 leading vendors sha...</description>
      <source url="https://orca.security/resources/blog/unified-agentic-defense-platforms-sacr-report">Orca Security Blog</source>
      <guid isPermaLink="true">https://orca.security/resources/blog/unified-agentic-defense-platforms-sacr-report</guid>
      <pubDate>Fri, 03 Apr 2026 12:50:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>North Korean Hackers Drain $285 Million From Drift in 10 Seconds</title>
      <link>https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds</link>
      <description>The attackers prepared infrastructure and multiple nonce-based transactions, took over an admin key, and drained five vaults. The post North Korean Hackers Drain $285 Million From Drift in 10 Seconds appeared first on...</description>
      <source url="https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/north-korean-hackers-drain-285-million-from-drift-in-10-seconds</guid>
      <pubDate>Fri, 03 Apr 2026 09:46:06 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
      <link>https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html</link>
      <description>Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating system...</description>
      <source url="https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html</guid>
      <pubDate>Fri, 03 Apr 2026 14:40:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
      <link>https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html</link>
      <description>Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. "Earlier today, a malicious actor gained...</description>
      <source url="https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html</guid>
      <pubDate>Fri, 03 Apr 2026 14:05:00 +0530</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs</title>
      <link>https://www.infosecurity-magazine.com/news/new-phishing-platform-credential</link>
      <description>A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom</description>
      <source url="https://www.infosecurity-magazine.com/news/new-phishing-platform-credential">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/new-phishing-platform-credential</guid>
      <pubDate>Fri, 03 Apr 2026 08:00:00 +0000</pubDate>
      <category>Phishing</category>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies</title>
      <link>https://securityaffairs.com/190319/data-breach/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies.html</link>
      <description>Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announced on April 2 that it breached PSK Wind Technologies, an Is...</description>
      <source url="https://securityaffairs.com/190319/data-breach/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/190319/data-breach/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies.html</guid>
      <pubDate>Fri, 03 Apr 2026 07:52:52 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance</title>
      <link>https://www.helpnetsecurity.com/2026/04/03/aperion-smartflow-sdk-ai-governance</link>
      <description>APERION launched SmartFlow SDK, providing a secure, on-premises path for enterprises migrating away from compromised cloud-based AI gateways. The launch coincides with a 200% increase in web traffic since the March 24...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/03/aperion-smartflow-sdk-ai-governance">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/03/aperion-smartflow-sdk-ai-governance</guid>
      <pubDate>Fri, 03 Apr 2026 07:06:01 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Which messaging app takes the most limited approach to permissions on Android?</title>
      <link>https://www.helpnetsecurity.com/2026/04/03/android-permissions-privacy-risks-research</link>
      <description>Messaging apps handle sensitive conversations, contacts, and media, and their behavior on a device varies in ways that affect privacy. An analysis of Android versions of Messenger, Signal, and Telegram shows that diff...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/03/android-permissions-privacy-risks-research">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/03/android-permissions-privacy-risks-research</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:19 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Click, wait, repeat: Digital trust erodes one login at a time</title>
      <link>https://www.helpnetsecurity.com/2026/04/03/thales-digital-trust-trends-report</link>
      <description>Sign-up forms that drag on, login steps that repeat, and access requests that take longer than expected have become a normal part of using digital services. These moments rarely stand out on their own, and over time t...</description>
      <source url="https://www.helpnetsecurity.com/2026/04/03/thales-digital-trust-trends-report">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/03/thales-digital-trust-trends-report</guid>
      <pubDate>Fri, 03 Apr 2026 04:30:22 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Axios npm Supply Chain Compromise</title>
      <link>https://fortiguard.fortinet.com/threat-signal-report/6390</link>
      <description>What is the Attack? A software supply chain attack targeted the widely used JavaScript library Axios after an attacker reportedly compromised a maintainer’s npm account and published malicious package versions 1.14.1...</description>
      <source url="https://fortiguard.fortinet.com/threat-signal-report/6390">FortiGuard Labs</source>
      <guid isPermaLink="true">https://fortiguard.fortinet.com/threat-signal-report/6390</guid>
      <pubDate>Thu, 02 Apr 2026 19:50:07 -0700</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026</title>
      <link>https://www.darkreading.com/cybersecurity-operations/geopolitics-ai-cybersecurity-insights-rsac-2026</link>
      <description>AI-driven threats, global leadership shifts, and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference.</description>
      <source url="https://www.darkreading.com/cybersecurity-operations/geopolitics-ai-cybersecurity-insights-rsac-2026">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cybersecurity-operations/geopolitics-ai-cybersecurity-insights-rsac-2026</guid>
      <pubDate>Thu, 02 Apr 2026 21:14:27 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Four security principles for agentic AI systems</title>
      <link>https://aws.amazon.com/blogs/security/four-security-principles-for-agentic-ai-systems</link>
      <description>Agentic AI represents a qualitative shift in how software operates. Traditional software executes deterministic instructions. Generative AI responds to human prompts with output that humans review and use at their dis...</description>
      <source url="https://aws.amazon.com/blogs/security/four-security-principles-for-agentic-ai-systems">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/four-security-principles-for-agentic-ai-systems</guid>
      <pubDate>Thu, 02 Apr 2026 20:45:09 +0000</pubDate>
      <category>AWS</category>
      <category>AI</category>
    </item>
    <item>
      <title>Claude Code leak used to push infostealer malware on GitHub</title>
      <link>https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github</link>
      <description>Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github</guid>
      <pubDate>Thu, 02 Apr 2026 16:30:55 -0400</pubDate>
      <category>Vulnerability</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
      <link>https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html</link>
      <description>A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secret...</description>
      <source url="https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html</guid>
      <pubDate>Fri, 03 Apr 2026 01:00:00 +0530</pubDate>
      <category>AWS</category>
      <category>Vulnerability</category>
      <category>Breach</category>
    </item>
    <item>
      <title>Security Bosses Are All-In on AI. Here's Why</title>
      <link>https://www.darkreading.com/cybersecurity-operations/security-bosses-all-in-ai</link>
      <description>CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave Gruber about how AI is working out in the real world, as well as its future promise.</description>
      <source url="https://www.darkreading.com/cybersecurity-operations/security-bosses-all-in-ai">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cybersecurity-operations/security-bosses-all-in-ai</guid>
      <pubDate>Thu, 02 Apr 2026 19:12:45 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Residential proxies evaded IP reputation checks in 78% of 4B sessions</title>
      <link>https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions</link>
      <description>Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions</guid>
      <pubDate>Thu, 02 Apr 2026 11:21:02 -0400</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>New 'Storm' Infostealer Remotely Decrypts Stolen Credentials</title>
      <link>https://www.infosecurity-magazine.com/news/storm-infostealer-remotely</link>
      <description>This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls</description>
      <source url="https://www.infosecurity-magazine.com/news/storm-infostealer-remotely">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/storm-infostealer-remotely</guid>
      <pubDate>Thu, 02 Apr 2026 15:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)</title>
      <link>https://isc.sans.edu/diary/rss/32860</link>
      <description>From its GitHub repo: "Vite (French word for "quick", pronounced /vi?t/, like "veet") is a new breed of frontend build tooling that significantly improves the frontend development experience" [https://github.com/vitej...</description>
      <source url="https://isc.sans.edu/diary/rss/32860">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32860</guid>
      <pubDate>Thu, 02 Apr 2026 14:49:00 +0000</pubDate>
      <category>Vulnerability</category>
      <category>Breach</category>
    </item>
    <item>
      <title>NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal</link>
      <description>The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks</description>
      <source url="https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-alert-hackers-whatsapp-signal</guid>
      <pubDate>Thu, 02 Apr 2026 14:15:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime</title>
      <link>https://www.bleepingcomputer.com/news/security/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime</link>
      <description>Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime</guid>
      <pubDate>Thu, 02 Apr 2026 10:01:11 -0400</pubDate>
      <category>Vulnerability</category>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>vSphere and BRICKSTORM Malware: A Defender's Guide</title>
      <link>https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide</link>
      <description>Written by: Stuart Carrera Introduction Building on recent BRICKSTORM research from Google Threat Intelligence Group (GTIG), this post explores the evolving threats facing virtualized environments. These operations di...</description>
      <source url="https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide">Google Threat Intelligence</source>
      <guid isPermaLink="true">https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide</guid>
      <pubDate>Thu, 02 Apr 2026 14:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Apple Expands iOS 18 Security Updates Amid DarkSword Threat</title>
      <link>https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword</link>
      <description>iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit</description>
      <source url="https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword</guid>
      <pubDate>Thu, 02 Apr 2026 13:30:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>[Video] The TTP Ep 21: When Attackers Become Trusted Users</title>
      <link>https://blog.talosintelligence.com/video-the-ttp-ep-21-when-attackers-become-trusted-users</link>
      <description>An episode of the Talos Threat Perspective on the 2025 Year in Review trends. We explore how identity is being used to gain, extend, and maintain access inside environments.</description>
      <source url="https://blog.talosintelligence.com/video-the-ttp-ep-21-when-attackers-become-trusted-users">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/video-the-ttp-ep-21-when-attackers-become-trusted-users</guid>
      <pubDate>Thu, 02 Apr 2026 13:06:45 +0000</pubDate>
      <category>Identity</category>
    </item>
    <item>
      <title>Why we're rethinking cache for the AI era</title>
      <link>https://blog.cloudflare.com/rethinking-cache-ai-humans</link>
      <description>The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at some of the ways AI bot traffic differs from humans, how thi...</description>
      <source url="https://blog.cloudflare.com/rethinking-cache-ai-humans">Cloudflare Blog</source>
      <guid isPermaLink="true">https://blog.cloudflare.com/rethinking-cache-ai-humans</guid>
      <pubDate>Thu, 02 Apr 2026 13:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Researchers Observe Sub-One-Hour Ransomware Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware</link>
      <description>Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour</description>
      <source url="https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-subonehour-ransomware</guid>
      <pubDate>Thu, 02 Apr 2026 13:00:00 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>GitHub Used as Covert Channel in Multi-Stage Malware Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware</link>
      <description>LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration</description>
      <source url="https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-covert-multi-stage-malware</guid>
      <pubDate>Thu, 02 Apr 2026 13:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories</title>
      <link>https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html</link>
      <description>The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping sys...</description>
      <source url="https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html</guid>
      <pubDate>Thu, 02 Apr 2026 18:15:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications</title>
      <link>https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications</link>
      <description>Talos is disclosing a large-scale automated credential harvesting campaign carried out by a threat cluster we currently track as UAT-10608. The campaign is primarily leveraging a collection framework dubbed “NEXUS Lis...</description>
      <source url="https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications</guid>
      <pubDate>Thu, 02 Apr 2026 10:00:57 +0000</pubDate>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Qilin EDR killer infection chain</title>
      <link>https://blog.talosintelligence.com/qilin-edr-killer</link>
      <description>This blog provides an in-depth analysis of the malicious “msimg32.dll” used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems.</description>
      <source url="https://blog.talosintelligence.com/qilin-edr-killer">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/qilin-edr-killer</guid>
      <pubDate>Thu, 02 Apr 2026 10:00:56 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders</title>
      <link>https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders</link>
      <description>A conversation between Cisco Talos and Cisco Security leaders on the 2025 threat landscape, from identity attacks and legacy vulnerabilities to AI-driven threats, and what defenders should prioritize now.</description>
      <source url="https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders</guid>
      <pubDate>Thu, 02 Apr 2026 10:00:49 +0000</pubDate>
      <category>Identity</category>
      <category>AI</category>
    </item>
    <item>
      <title>An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases</title>
      <link>https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases</link>
      <description>There were 134 ransomware incidents reported in Japan in 2025, representing a 17.5% year-over-year increase from 2024.</description>
      <source url="https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases</guid>
      <pubDate>Thu, 02 Apr 2026 10:00:13 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit</title>
      <link>https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html</link>
      <description>Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit known as DarkSword. "We enabled the a...</description>
      <source url="https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html</guid>
      <pubDate>Thu, 02 Apr 2026 12:39:00 +0530</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>The Sysdig MCP server is now available in AWS Marketplace</title>
      <link>https://webflow.sysdig.com/blog/the-sysdig-mcp-server-is-now-available-in-aws-marketplace</link>
      <description>Correlating security signals from cloud services, container registries, and runtime environments is an important component of maintaining secure cloud deployments. But making this a seamless process, without the need...</description>
      <source url="https://webflow.sysdig.com/blog/the-sysdig-mcp-server-is-now-available-in-aws-marketplace">Sysdig Blog</source>
      <guid isPermaLink="true">https://webflow.sysdig.com/blog/the-sysdig-mcp-server-is-now-available-in-aws-marketplace</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
    </item>
    <item>
      <title>Risk isn’t reduced until you take action: How teams resolve issues in the cloud</title>
      <link>https://webflow.sysdig.com/blog/risk-isnt-reduced-until-you-take-action-how-teams-resolve-issues-in-the-cloud</link>
      <description>Effective remediation depends on real-time insight that allows security teams to quickly investigate, understand, and respond to threats with precision. By taking targeted actions like stopping compromised workloads,...</description>
      <source url="https://webflow.sysdig.com/blog/risk-isnt-reduced-until-you-take-action-how-teams-resolve-issues-in-the-cloud">Sysdig Blog</source>
      <guid isPermaLink="true">https://webflow.sysdig.com/blog/risk-isnt-reduced-until-you-take-action-how-teams-resolve-issues-in-the-cloud</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)</title>
      <link>https://isc.sans.edu/diary/rss/32854</link>
      <description>Today, most malware are called â€œfilelessâ€ because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write somethingâ€¦ think about persistence. They can us...</description>
      <source url="https://isc.sans.edu/diary/rss/32854">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32854</guid>
      <pubDate>Wed, 01 Apr 2026 20:09:43 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Google Introduces Android Dev Verification Amid Openness Debate</title>
      <link>https://www.infosecurity-magazine.com/news/google-android-dev-verification</link>
      <description>Android requires dev identity verification for sideloaded apps; phased global rollout from September</description>
      <source url="https://www.infosecurity-magazine.com/news/google-android-dev-verification">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/google-android-dev-verification</guid>
      <pubDate>Wed, 01 Apr 2026 15:00:00 +0000</pubDate>
      <category>Identity</category>
    </item>
    <item>
      <title>Venom Stealer MaaS Platform Commoditizes ClickFix Attacks</title>
      <link>https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks</link>
      <description>A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.</description>
      <source url="https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks</guid>
      <pubDate>Wed, 01 Apr 2026 14:54:23 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass</title>
      <link>https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html</link>
      <description>Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late February 2026, leverages these scripts to...</description>
      <source url="https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html</guid>
      <pubDate>Wed, 01 Apr 2026 19:40:00 +0530</pubDate>
      <category>Azure</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>New Venom Stealer MaaS Platform Automates Continuous Data Theft</title>
      <link>https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data</link>
      <description>Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration</description>
      <source url="https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/venom-stealer-maas-automates-data</guid>
      <pubDate>Wed, 01 Apr 2026 13:30:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)</title>
      <link>https://isc.sans.edu/diary/rss/32856</link>
      <description>This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 004 covered developments through March 30, includi...</description>
      <source url="https://isc.sans.edu/diary/rss/32856">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32856</guid>
      <pubDate>Wed, 01 Apr 2026 13:08:26 +0000</pubDate>
      <category>Supply Chain</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Block the Prompt, Not the Work: The End of "Doctor No"</title>
      <link>https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html</link>
      <description>There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its entire function is to say "No." No to ChatGPT. No to Deep...</description>
      <source url="https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html</guid>
      <pubDate>Wed, 01 Apr 2026 18:16:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures</title>
      <link>https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html</link>
      <description>A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Hora...</description>
      <source url="https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html</guid>
      <pubDate>Wed, 01 Apr 2026 18:06:00 +0530</pubDate>
      <category>Phishing</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
      <link>https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog</link>
      <description>CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-5281 Google Dawn Use-After-Free Vulnerability This type of vulnerability i...</description>
      <source url="https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Current Activity</source>
      <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog</guid>
      <pubDate>Wed, 01 Apr 2026 12:00:00 +0000</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released</title>
      <link>https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html</link>
      <description>Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5...</description>
      <source url="https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html</guid>
      <pubDate>Wed, 01 Apr 2026 17:12:00 +0530</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>A Taxonomy of Cognitive Security</title>
      <link>https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html</link>
      <description>Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here , but—even better—Menton has a long essay laying out the bas...</description>
      <source url="https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/04/a-taxonomy-of-cognitive-security.html</guid>
      <pubDate>Wed, 01 Apr 2026 09:59:07 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year</title>
      <link>https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit</link>
      <description>Most UK manufacturers compromised last year suffered financial loss, says ESET</description>
      <source url="https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit</guid>
      <pubDate>Wed, 01 Apr 2026 09:30:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Hackers Hijack Axios npm Package to Spread RATs</title>
      <link>https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package</link>
      <description>Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn</description>
      <source url="https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/hackers-hijack-axios-npm-package</guid>
      <pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069</title>
      <link>https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html</link>
      <description>Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. "We have attributed the attack to a suspe...</description>
      <source url="https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html</guid>
      <pubDate>Wed, 01 Apr 2026 13:14:00 +0530</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Elastic releases detections for the Axios supply chain compromise</title>
      <link>https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections</link>
      <description>Hunting and detection rules for the Elastic-discovered Axios supply chain compromise.</description>
      <source url="https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections</guid>
      <pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure</title>
      <link>https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks</link>
      <description>TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure a...</description>
      <source url="https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks">Palo Alto Networks Unit 42</source>
      <guid isPermaLink="true">https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks</guid>
      <pubDate>Tue, 31 Mar 2026 21:00:39 +0000</pubDate>
      <category>Ransomware</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Axios NPM Package Compromised in Precision Attack</title>
      <link>https://www.darkreading.com/application-security/axios-npm-package-compromised-precision-attack</link>
      <description>The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.</description>
      <source url="https://www.darkreading.com/application-security/axios-npm-package-compromised-precision-attack">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/application-security/axios-npm-package-compromised-precision-attack</guid>
      <pubDate>Tue, 31 Mar 2026 20:55:13 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>New compliance guide available: ISO/IEC 27001:2022 on AWS</title>
      <link>https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-270012022-on-aws-compliance-guide</link>
      <description>We’re excited to announce the release of our latest compliance guide, ISO/IEC 27001:2022 on AWS, which provides practical guidance for organizations designing and operating an Information Security Management System (I...</description>
      <source url="https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-270012022-on-aws-compliance-guide">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-270012022-on-aws-compliance-guide</guid>
      <pubDate>Tue, 31 Mar 2026 20:36:56 +0000</pubDate>
      <category>AWS</category>
    </item>
    <item>
      <title>Google's Vertex AI Is Over-Privileged. That's a Problem</title>
      <link>https://www.darkreading.com/cyber-risk/googles-vertex-ai-over-privilege-problem</link>
      <description>Palo Alto Networks researchers show how attackers could exploit AI agents on Google's Vertex AI to steal data and break into restricted cloud infrastructure.</description>
      <source url="https://www.darkreading.com/cyber-risk/googles-vertex-ai-over-privilege-problem">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyber-risk/googles-vertex-ai-over-privilege-problem</guid>
      <pubDate>Tue, 31 Mar 2026 20:26:33 +0000</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials</title>
      <link>https://www.darkreading.com/cloud-security/teampcp-breaches-cloud-saas-instances-stolen-credentials</link>
      <description>The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.</description>
      <source url="https://www.darkreading.com/cloud-security/teampcp-breaches-cloud-saas-instances-stolen-credentials">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cloud-security/teampcp-breaches-cloud-saas-instances-stolen-credentials</guid>
      <pubDate>Tue, 31 Mar 2026 20:02:28 +0000</pubDate>
      <category>AWS</category>
      <category>Azure</category>
      <category>Breach</category>
    </item>
    <item>
      <title>Maryland Man Charged Over $53m Uranium Finance Crypto Hack</title>
      <link>https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack</link>
      <description>Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds</description>
      <source url="https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack</guid>
      <pubDate>Tue, 31 Mar 2026 15:30:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>AI and Quantum Are Forcing a Rethink of Digital Trust</title>
      <link>https://www.darkreading.com/cybersecurity-operations/ai-and-quantum-are-forcing-a-rethink-of-digital-trust</link>
      <description>In a conversation with Dark Reading’s Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.</description>
      <source url="https://www.darkreading.com/cybersecurity-operations/ai-and-quantum-are-forcing-a-rethink-of-digital-trust">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cybersecurity-operations/ai-and-quantum-are-forcing-a-rethink-of-digital-trust</guid>
      <pubDate>Tue, 31 Mar 2026 15:29:11 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Phantom Project Bundles Infostealer, Crypter and RAT For Sale</title>
      <link>https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25</link>
      <description>Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service</description>
      <source url="https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/phantom-project-infostealer-nov-25</guid>
      <pubDate>Tue, 31 Mar 2026 14:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts</title>
      <link>https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html</link>
      <description>Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized access to...</description>
      <source url="https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html</guid>
      <pubDate>Tue, 31 Mar 2026 18:39:00 +0530</pubDate>
      <category>GCP</category>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>ChatGPT Security Issue Enabled Data Theft via Single Prompt</title>
      <link>https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data</link>
      <description>OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole</description>
      <source url="https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/chatgpt-security-issue-steal-data</guid>
      <pubDate>Tue, 31 Mar 2026 13:01:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Ransomware in 2025: Blending in is the strategy</title>
      <link>https://blog.talosintelligence.com/ransomware-in-2025-blending-in-is-the-strategy</link>
      <description>A summary of the top ransomware trends from the Talos 2025 Year in Review, with a focus on identity, attacker tactics, and practical defenses.</description>
      <source url="https://blog.talosintelligence.com/ransomware-in-2025-blending-in-is-the-strategy">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/ransomware-in-2025-blending-in-is-the-strategy</guid>
      <pubDate>Tue, 31 Mar 2026 10:00:02 +0000</pubDate>
      <category>Ransomware</category>
      <category>Identity</category>
    </item>
    <item>
      <title>NCSC Urges Immediate Patching of F5 BIG-IP Bug</title>
      <link>https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5</link>
      <description>The National Cyber Security Centre wants UK firms to patch CVE-2025-53521</description>
      <source url="https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5</guid>
      <pubDate>Tue, 31 Mar 2026 08:45:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Axios NPM Distribution Compromised in Supply Chain Attack</title>
      <link>https://www.wiz.io/blog/axios-npm-compromised-in-supply-chain-attack</link>
      <description>A compromised axios maintainer account led to malicious npm releases that propagated across environments. Learn how to assess impact, detect compromise, and secure your development workflows.</description>
      <source url="https://www.wiz.io/blog/axios-npm-compromised-in-supply-chain-attack">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/axios-npm-compromised-in-supply-chain-attack</guid>
      <pubDate>Tue, 31 Mar 2026 08:26:35 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)</title>
      <link>https://isc.sans.edu/diary/rss/32850</link>
      <description>In case of a cyber incident, most organizations fear more of data loss (via exfiltration) than regular data encryption because they have a good backup policy in place. If exfiltration happened, it means a total loss o...</description>
      <source url="https://isc.sans.edu/diary/rss/32850">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32850</guid>
      <pubDate>Tue, 31 Mar 2026 07:31:45 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)</title>
      <link>https://isc.sans.edu/diary/rss/32846</link>
      <description>This is the fourth update to the TeamPCP supply chain campaign threat intelligence report,&amp;#;x26;#;xc2;&amp;#;x26;#;xa0;"When the Security Scanner Became the Weapon"&amp;#;x26;#;xc2;&amp;#;x26;#;xa0;(v3.0, March 25, 2026). Update...</description>
      <source url="https://isc.sans.edu/diary/rss/32846">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32846</guid>
      <pubDate>Tue, 31 Mar 2026 00:52:44 +0000</pubDate>
      <category>Ransomware</category>
      <category>Supply Chain</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Fake Installers to Monero: A Multi-Tool Mining Operation</title>
      <link>https://www.elastic.co/security-labs/fake-installers-to-monero</link>
      <description>Elastic Security Labs dissects a long-running operation deploying RATs, cryptominers, and CPA fraud through fake installer lures, tracking its evolution across campaigns and Monero payouts.</description>
      <source url="https://www.elastic.co/security-labs/fake-installers-to-monero">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/fake-installers-to-monero</guid>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild</title>
      <link>https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild</link>
      <description>How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments</description>
      <source url="https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild</guid>
      <pubDate>Mon, 30 Mar 2026 23:54:14 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>AI-Driven Code Surge Is Forcing a Rethink of AppSec</title>
      <link>https://www.darkreading.com/application-security/ai-driven-code-surge-is-forcing-a-rethink-of-appsec</link>
      <description>In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.</description>
      <source url="https://www.darkreading.com/application-security/ai-driven-code-surge-is-forcing-a-rethink-of-appsec">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/application-security/ai-driven-code-surge-is-forcing-a-rethink-of-appsec</guid>
      <pubDate>Mon, 30 Mar 2026 18:42:33 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability</title>
      <link>https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html</link>
      <description>A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. "A single malicious prompt coul...</description>
      <source url="https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html</guid>
      <pubDate>Mon, 30 Mar 2026 23:35:00 +0530</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Manufacturing &amp;amp; Healthcare Share Struggles with Passwords</title>
      <link>https://www.darkreading.com/cyber-risk/manufacturing-and-healthcare-share-struggles-with-passwords</link>
      <description>The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.</description>
      <source url="https://www.darkreading.com/cyber-risk/manufacturing-and-healthcare-share-struggles-with-passwords">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyber-risk/manufacturing-and-healthcare-share-struggles-with-passwords</guid>
      <pubDate>Mon, 30 Mar 2026 16:25:19 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More</title>
      <link>https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html</link>
      <description>Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical rig...</description>
      <source url="https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html</guid>
      <pubDate>Mon, 30 Mar 2026 19:26:00 +0530</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>The Wiz Blue Agent, now Generally Available</title>
      <link>https://www.wiz.io/blog/wiz-blue-agent-generally-available</link>
      <description>Accelerate your SecOps team with the Blue Agent for threat investigation, now Generally Available</description>
      <source url="https://www.wiz.io/blog/wiz-blue-agent-generally-available">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/wiz-blue-agent-generally-available</guid>
      <pubDate>Mon, 30 Mar 2026 13:16:04 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>3 SOC Process Fixes That Unlock Tier 1 Productivity</title>
      <link>https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html</link>
      <description>What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited...</description>
      <source url="https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html</guid>
      <pubDate>Mon, 30 Mar 2026 18:30:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels</title>
      <link>https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html</link>
      <description>Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according...</description>
      <source url="https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html</guid>
      <pubDate>Mon, 30 Mar 2026 17:48:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
      <link>https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog</link>
      <description>CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability This type of vulner...</description>
      <source url="https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Current Activity</source>
      <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog</guid>
      <pubDate>Mon, 30 Mar 2026 12:00:00 +0000</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>European Commission Confirms Cloud Data Breach</title>
      <link>https://www.infosecurity-magazine.com/news/european-commission-cloud-data</link>
      <description>The European Commission has revealed details of a data breach impacting its AWS infrastructure</description>
      <source url="https://www.infosecurity-magazine.com/news/european-commission-cloud-data">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/european-commission-cloud-data</guid>
      <pubDate>Mon, 30 Mar 2026 08:15:00 +0000</pubDate>
      <category>AWS</category>
      <category>Breach</category>
    </item>
    <item>
      <title>Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign</title>
      <link>https://thehackernews.com/2026/03/three-china-linked-clusters-target.html</link>
      <description>Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the...</description>
      <source url="https://thehackernews.com/2026/03/three-china-linked-clusters-target.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/three-china-linked-clusters-target.html</guid>
      <pubDate>Mon, 30 Mar 2026 12:30:00 +0530</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Cloudflare Client-Side Security: smarter detection, now open to everyone</title>
      <link>https://blog.cloudflare.com/client-side-security-open-to-everyone</link>
      <description>We are opening our advanced Client-Side Security tools to all users, featuring a new cascading AI detection system. By combining graph neural networks and LLMs, we've reduced false positives by up to 200x while catchi...</description>
      <source url="https://blog.cloudflare.com/client-side-security-open-to-everyone">Cloudflare Blog</source>
      <guid isPermaLink="true">https://blog.cloudflare.com/client-side-security-open-to-everyone</guid>
      <pubDate>Mon, 30 Mar 2026 06:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign</title>
      <link>https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html</link>
      <description>Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attribu...</description>
      <source url="https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html</guid>
      <pubDate>Sat, 28 Mar 2026 12:37:00 +0530</pubDate>
      <category>Vulnerability</category>
      <category>Phishing</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation</title>
      <link>https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html</link>
      <description>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog, citing ev...</description>
      <source url="https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html</guid>
      <pubDate>Sat, 28 Mar 2026 12:37:00 +0530</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack</title>
      <link>https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package</link>
      <description>Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware</description>
      <source url="https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package</guid>
      <pubDate>Fri, 27 Mar 2026 15:06:00 +0000</pubDate>
      <category>Supply Chain</category>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks</title>
      <link>https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html</link>
      <description>Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's pre-publish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code (VS Code) extension to pass...</description>
      <source url="https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html</guid>
      <pubDate>Fri, 27 Mar 2026 19:27:00 +0530</pubDate>
      <category>Azure</category>
    </item>
    <item>
      <title>Beyond the Badge: What Achieving Microsoft’s Certified Software Designation Means for Your Cloud Security</title>
      <link>https://www.wiz.io/blog/wiz-achieves-microsoft-certified-software-designation</link>
      <description>Verified by Microsoft. Built for Azure. Secured by Wiz.</description>
      <source url="https://www.wiz.io/blog/wiz-achieves-microsoft-certified-software-designation">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/wiz-achieves-microsoft-certified-software-designation</guid>
      <pubDate>Fri, 27 Mar 2026 13:38:43 +0000</pubDate>
      <category>Azure</category>
    </item>
    <item>
      <title>Infrastructure Attacks With Physical Consequences Down 25%</title>
      <link>https://www.darkreading.com/threat-intelligence/infrastructure-attacks-physical-consequences-down</link>
      <description>Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.</description>
      <source url="https://www.darkreading.com/threat-intelligence/infrastructure-attacks-physical-consequences-down">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/threat-intelligence/infrastructure-attacks-physical-consequences-down</guid>
      <pubDate>Fri, 27 Mar 2026 13:30:00 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
      <link>https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog</link>
      <description>CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability This type of vulnerabi...</description>
      <source url="https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Current Activity</source>
      <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog</guid>
      <pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
      <link>https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html</link>
      <description>Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. B...</description>
      <source url="https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html</guid>
      <pubDate>Fri, 27 Mar 2026 13:37:00 +0530</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>DarkSword iOS Exploit Chain</title>
      <link>https://fortiguard.fortinet.com/threat-signal-report/6389</link>
      <description>What is the Attack? Researchers from Google Threat Intelligence Group identified DarkSword, a sophisticated full-chain iOS exploit framework actively used by multiple surveillance vendors and suspected state-sponsored...</description>
      <source url="https://fortiguard.fortinet.com/threat-signal-report/6389">FortiGuard Labs</source>
      <guid isPermaLink="true">https://fortiguard.fortinet.com/threat-signal-report/6389</guid>
      <pubDate>Thu, 26 Mar 2026 20:54:34 -0700</pubDate>
      <category>Vulnerability</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER</title>
      <link>https://www.elastic.co/security-labs/brushworm-targets-financial-services</link>
      <description>Elastic Security Labs observed two custom malware components targeting a South Asian financial institution: a modular backdoor with USB-based spreading and a DLL-side-loaded keylogger.</description>
      <source url="https://www.elastic.co/security-labs/brushworm-targets-financial-services">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/brushworm-targets-financial-services</guid>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Preparing for agentic AI: A financial services approach</title>
      <link>https://aws.amazon.com/blogs/security/preparing-for-agentic-ai-a-financial-services-approach</link>
      <description>Deploying agentic AI in financial services requires additional security controls that address AI-specific risks. This post walks you through comprehensive observability and fine-grained access controls—two critical ca...</description>
      <source url="https://aws.amazon.com/blogs/security/preparing-for-agentic-ai-a-financial-services-approach">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/preparing-for-agentic-ai-a-financial-services-approach</guid>
      <pubDate>Thu, 26 Mar 2026 22:00:45 +0000</pubDate>
      <category>AWS</category>
      <category>AI</category>
    </item>
    <item>
      <title>Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government</title>
      <link>https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org</link>
      <description>Unit 42 uncovers multiple clusters of cyberespionage targeting a Southeast Asian government organization with USBFect, RATs and loaders. The post Converging Interests: Analysis of Threat Clusters Targeting a Southeast...</description>
      <source url="https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org">Palo Alto Networks Unit 42</source>
      <guid isPermaLink="true">https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org</guid>
      <pubDate>Thu, 26 Mar 2026 22:00:32 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>TP-Link, Canva, HikVision vulnerabilities</title>
      <link>https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities</link>
      <description>Cisco Talos’ Vulnerability Discovery &amp; Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by the...</description>
      <source url="https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities</guid>
      <pubDate>Thu, 26 Mar 2026 18:34:26 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks</title>
      <link>https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html</link>
      <description>A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves im...</description>
      <source url="https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html</guid>
      <pubDate>Thu, 26 Mar 2026 23:10:00 +0530</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code</title>
      <link>https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities</link>
      <description>Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code</description>
      <source url="https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities</guid>
      <pubDate>Thu, 26 Mar 2026 16:40:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
      <link>https://thehackernews.com/2026/03/webinar-stop-guessing-learn-to-validate.html</link>
      <description>Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. But one question usually stays unanswered: Would your defe...</description>
      <source url="https://thehackernews.com/2026/03/webinar-stop-guessing-learn-to-validate.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/03/webinar-stop-guessing-learn-to-validate.html</guid>
      <pubDate>Thu, 26 Mar 2026 18:42:00 +0530</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Talos Takes: 2025 insights from Talos and Splunk</title>
      <link>https://blog.talosintelligence.com/cybersecuritys-double-header-2025-insights-from-talos-and-splunk</link>
      <description>This episode of Talos Takes breaks down the 2025 Year in Review as well as Splunk's Top 50 Cybersecurity Threats report.</description>
      <source url="https://blog.talosintelligence.com/cybersecuritys-double-header-2025-insights-from-talos-and-splunk">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/cybersecuritys-double-header-2025-insights-from-talos-and-splunk</guid>
      <pubDate>Thu, 26 Mar 2026 12:48:18 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns</title>
      <link>https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety</link>
      <description>OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws</description>
      <source url="https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety</guid>
      <pubDate>Thu, 26 Mar 2026 12:20:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
      <link>https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog</link>
      <description>CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33634 Aqua Security Trivy Embedded Malicious Code Vulnerability This type...</description>
      <source url="https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Current Activity</source>
      <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog</guid>
      <pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters</title>
      <link>https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html</link>
      <description>In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and withhold funds from states that try to do so. This action poi...</description>
      <source url="https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html</guid>
      <pubDate>Thu, 26 Mar 2026 11:06:39 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Iran-Linked Pay2Key Ransomware Group Re-Emerges</title>
      <link>https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware</link>
      <description>Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key</description>
      <source url="https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware</guid>
      <pubDate>Thu, 26 Mar 2026 10:45:00 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>Invoice Fraud Costs UK Construction Sector Millions, NCA Warns</title>
      <link>https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction</link>
      <description>The National Crime Agency has warned construction firms about surging invoice fraud</description>
      <source url="https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/invoice-fraud-uk-construction</guid>
      <pubDate>Thu, 26 Mar 2026 10:07:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Illuminating VoidLink: Technical analysis of the VoidLink rootkit framework</title>
      <link>https://www.elastic.co/security-labs/illuminating-voidlink</link>
      <description>Elastic Security Labs analyzes VoidLink, a sophisticated Linux malware framework that combines traditional Loadable Kernel Modules with eBPF to maintain persistence.</description>
      <source url="https://www.elastic.co/security-labs/illuminating-voidlink">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/illuminating-voidlink</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>At RSAC, the EU Leads While US Officials Are Sidelined</title>
      <link>https://www.darkreading.com/cyber-risk/rsac-eu-leads-us-officials-sidelined</link>
      <description>While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.</description>
      <source url="https://www.darkreading.com/cyber-risk/rsac-eu-leads-us-officials-sidelined">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyber-risk/rsac-eu-leads-us-officials-sidelined</guid>
      <pubDate>Wed, 25 Mar 2026 21:52:38 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Introducing Wiz Workflows: Your path to building a self healing cloud</title>
      <link>https://www.wiz.io/blog/introducing-wiz-workflows</link>
      <description>Orchestrate customizable workflows with agents, enabling end-to-end discovery and response in Wiz</description>
      <source url="https://www.wiz.io/blog/introducing-wiz-workflows">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/introducing-wiz-workflows</guid>
      <pubDate>Wed, 25 Mar 2026 17:17:03 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam</title>
      <link>https://www.darkreading.com/cyberattacks-data-breaches/phishers-pose-palo-alto-networks-recruiters-job-scam</link>
      <description>A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.</description>
      <source url="https://www.darkreading.com/cyberattacks-data-breaches/phishers-pose-palo-alto-networks-recruiters-job-scam">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyberattacks-data-breaches/phishers-pose-palo-alto-networks-recruiters-job-scam</guid>
      <pubDate>Wed, 25 Mar 2026 15:05:52 +0000</pubDate>
      <category>Jobs</category>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
  </channel>
</rss>