A sophisticated social engineering operation by UNC1069 has led to the compromise of the widely used Axios npm package, raising serious concerns across the JavaScript ecosystem. The attack targeted a member of the Axios project’s maintainer team by masquerading…
Dutch Court Issues Order Against X and Grok Over Sexual Abuse Content
A court in the Netherlands has taken strict action against the platform X and its artificial intelligence system Grok, directing both to stop enabling the creation of sexually explicit images generated without consent, as well as any material involving…
Port of Vigo Operations Interrupted by Significant Cyberattack
Upon finding its digital backbone compromised by a calculated act of cyber extortion, the Port of Vigo found itself in the midst of the morning rhythms of one of Spain’s most strategically located maritime gateways. Early in the morning…
Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Qilin…
Image or Malware? Read until the end and answer in comments :)
A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes. I received this email from a friend to make an analysis. First, let me express my thanks to Janô Falkowski Burkard for…
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals
Companies invest heavily in DDoS mitigation, yet outages still happen—often at the worst possible moment. The problem is rarely the protection technology, but the unseen gaps between deployment and a real attack, where misconfigurations, false assumptions, and untested scenarios quietly…
Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost of deepfake production low enough that criminals…
IT Security News Hourly Summary 2026-04-05 09h : 2 posts
2 posts were published in the last hour 6:7 : Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS 6:7 : 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation.…
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant. “Every package…
Truckloads of food are being wasted because computers won’t approve them
Modern food systems may look stable on the surface, but they are increasingly dependent on digital systems that can quietly become a major point of failure. Today, food must be “recognized” by databases and automated platforms to be transported, sold,…
How do NHIs drive technology innovation
How Are NHIs Revolutionizing Technology Across Industries? What are the unseen forces revolutionizing technological? Non-Human Identities (NHIs) are among the top contenders, silently working behind the scenes to safeguard digital environments. NHIs drive technology innovation by providing security professionals with…
How scalable is Agentic AI for growing businesses
Is Your Organization Prepared to Manage Non-Human Identities Effectively? The rapid surge in digital transformation has fundamentally shifted how organizations across industries operate. When businesses embrace digital innovations, they also face a complex challenge: managing Non-Human Identities (NHIs). These machine…
Why choosing Agentic AI empowers business leaders
How Can Non-Human Identities Enhance Your Cloud Security? How are organizations safeguarding their systems from the increasing threats posed by cyberattacks? A critical factor is the effective management of Non-Human Identities (NHIs) and Secrets Security. With cybersecurity professionals navigate the…
Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
November 20, 2025: Date this information was first published. We’re pleased to announce the availability of the latest sample security baseline from Landing Zone Accelerator on AWS (LZA)—the Universal Configuration. Developed from years of field experience with highly regulated customers…
IT Security News Hourly Summary 2026-04-05 00h : 1 posts
1 posts were published in the last hour 21:55 : IT Security News Daily Summary 2026-04-04
IT Security News Daily Summary 2026-04-04
48 posts were published in the last hour 20:4 : Sample Malware Phone Back C&C (Command and Control) MD5s From Domains Belonging to XSS Forum Users – A Compilation 19:5 : IT Security News Hourly Summary 2026-04-04 21h : 3…
Sample Malware Phone Back C&C (Command and Control) MD5s From Domains Belonging to XSS Forum Users – A Compilation
Dear blog readers, In my most recent analysis I decided to take a deeper look inside some of the domains which belong to members of the XSS forum are known to have been used as malicious software phone back C&C…
IT Security News Hourly Summary 2026-04-04 21h : 3 posts
3 posts were published in the last hour 18:5 : Qilin ransomware group claims the hack of German political party Die Linke 18:5 : US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks 18:5 : Why Single-Signal Fraud Detection…
Qilin ransomware group claims the hack of German political party Die Linke
Qilin ransomware claims it stole data from Germany’s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach. The Qilin ransomware group claims it stole data from Die Linke, a German political party, and…
US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks
Now under scrutiny: demands from American legislators for clearer rules on state tracking of online tools like virtual private networks. Backed by six congressional Democrats – including Ron Wyden – a letter reaches out to intelligence chief Tulsi Gabbard,…
Why Single-Signal Fraud Detection Fails Against Modern Multi-Stage Cyber Attacks
A Modern fraud operations resemble a coordinated relay, where multiple tools and actors manage different stages—from account creation to final cash-out. Focusing on just one indicator, such as IP address or email, leaves gaps that attackers can easily exploit…
China-based TA416 Targets European Businesses via Phishing Campaigns
Chinese state-sponsored attacks A China-based hacker is targeting European government and diplomatic entities; the attack started in mid-2025, after a two-year period of no targeting in the region. The campaign has been linked to TA416; the activities coincide with DarkPeony,…
U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as CVE-2026-3502 (CVSS score of 7.8), to…