News
Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability
3+ hour, 29+ min ago (391+ words) A massive automated credential theft campaign is actively targeting web applications worldwide. Cybersecurity researchers at Cisco Talos have uncovered an operation by a hacker group tracked as UAT-10608, which has already compromised over 700 servers. The attackers are exploiting a critical…...
North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack
4+ hour, 25+ min ago (586+ words) A North Korea-linked threat group has successfully hijacked one of the most widely used JavaScript libraries on the internet, injecting malware into millions of potential development environments. On March 31, 2026, attackers gained access to the Axios Node Package Manager (npm) package…...
Google News
19+ hour, 25+ min ago (12+ words) Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor's EDR Solutions'CyberSecurityNews...
20 Best Application Performance Monitoring Tools in 2026
5+ hour, 38+ min ago (1136+ words) Using APM tools and methodologies, organizations may diagnose issues that impair the user experience, discover performance bottlenecks, and gain visibility into how their applications operate. These metrics shed light on the application's general condition and functionality. End-user experience monitoring, which…...
Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor's EDR Solutions
19+ hour, 25+ min ago (549+ words) Qilin ransomware group is deploying a sophisticated, multi-stage infection chain via a malicious msimg32.dll that can disable over 300 endpoint detection and response (EDR) drivers from virtually every major security vendor. As organizations increasingly rely on EDR solutions, which offer far…...
Top 20 Best Digital Forensic Tools in 2026
1+ day, 5+ hour ago (1527+ words) Digital forensic tools are specialized software designed to analyze, recover, and investigate data from digital devices. They help uncover crucial evidence in cybercrime investigations and legal proceedings. They offer features like data carving, metadata analysis, and file recovery, enabling investigators…...
New Akira Lookalike Ransomware Campaign Targeting Windows Users in South America
18+ hour, 55+ min ago (650+ words) A new and dangerous ransomware campaign has surfaced across South America, targeting Windows users with a carefully crafted strain that closely imitates the well-known Akira ransomware. While the two may appear nearly identical on the surface, this new threat is…...
Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT
18+ hour, 53+ min ago (536+ words) A threat group recently set up a convincing fake version of Ukraine's official cybersecurity authority website to trick targets into downloading a dangerous remote access tool. The campaign, now tracked under the identifier UAC-0255, relied on a mix of phishing…...
Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ Malware Campaign
20+ hour, 14+ min ago (606+ words) A seemingly routine procurement email has become the entry point for a sophisticated six-stage malware attack targeting industrial suppliers and procurement teams. The campaign, tracked as NKFZ5966PURCHASE, disguises itself as a Boeing Request for Quotation (RFQ) from a person named "Joyce…...
OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues
20+ hour, 13+ min ago (332+ words) The OpenSSH project released version 10.3 and 10.3p1 on April 2, 2026, addressing a shell injection vulnerability and introducing several security-hardening changes that administrators should review before upgrading. The flaw was reported by a researcher identified as "rabbit." OpenSSH developers note that exposing these…...