Saltar al contenido
Jue. Abr 16th, 2026
Trending News: Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 TrafficObsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto AttacksHidden Passenger? How Taboola Routes Logged-In Banking Sessions to TemuDefender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your EnvironmentCisco Patches Four Critical Identity Services, Webex Flaws Enabling Code ExecutionUAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaignn8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing EmailsApril Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and MoreActively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server TakeoverThe Architecture Exposure Validation RequiresMicrosoft Issues Patches for SharePoint Zero-Day and 168 Other New VulnerabilitiesOpenAI Launches GPT-5.4-Cyber with Expanded Access for Security TeamsNew PHP Composer Flaws Enable Arbitrary Command Execution — Patches ReleasedAI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad FraudGoogle Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance SecurityMirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta AdsAnalysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 UsersCISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched ServersJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud AttemptsFiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and MoreYour MTTD Looks Great. Your Post-Alert Gap Doesn’tNorth Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT MalwareOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain IncidentAdobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor DownloadsLaw Enforcement Used Webloc to Track 500 Million Devices via Ad DataGlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of DisclosureBrowser Extensions Are the New AI Consumption Channel That No One Is Talking AboutGoogle Rolls Out DBSC in Chrome 146 to Block Session Theft on WindowsBackdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend ServersEngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto WalletsUAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing CampaignsBitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA RegionHybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More StoriesAdobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025The Hidden Security Risks of Shadow AI in EnterprisesNew Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS ProxyMasjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT DevicesAPT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO AlliesShrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major SystemsN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, RustIran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCsRussian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking CampaignDocker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host AccessThe Hidden Cost of Recurring Credential IncidentsOver 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise RiskNew GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-FlipsChina-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa RansomwareFlowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances ExposedIran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 OrganizationsDPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South KoreaAxios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and MoreHow SOCs Close a Critical Risk in 3 StepsHow LiteLLM Turned Developer Machines Into Credential Vaults for AttackersQilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR ToolsBKA Identifies REvil Leaders Behind 130 German Ransomware Attacks$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering OperationFortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent ImplantsChina-Linked TA416 Targets European Governments with PlugX and OAuth-Based PhishingMicrosoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux ServersWhy Third-Party Risk Is the Biggest Gap in Your Clients’ Security PostureUNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain AttackDrift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRKNew SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase ImagesHackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal CredentialsCisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System CompromisePre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More StoriesThe State of Trusted Open Source ReportResearchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto MinersWhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces ActionApple Expands iOS 18.7.7 Update to More Devices to Block DarkSword ExploitCERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million EmailsNew Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch ReleasedCasbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF LuresMicrosoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC BypassBlock the Prompt, Not the Work: The End of "Doctor No"3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069Claude Code Source Leaked via npm Packaging Error, Anthropic ConfirmsAndroid Developer Verification Rollout Begins Ahead of September EnforcementTrueConf Zero-Day Exploited in Attacks on Southeast Asian Government NetworksThe AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom PriorityVertex AI Vulnerability Exposes Google Cloud Data and Private ArtifactsSilver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake DomainsAxios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm AccountOpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token VulnerabilityDeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials3 SOC Process Fixes That Unlock Tier 1 ProductivityTelecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and MoreThe State of Secrets Sprawl 2026: 9 Takeaways for CISOsRussian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP TunnelsThree China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Chicago 12, Melborne City, USA
The Digital Fortress
  • Home
  • Blog
  • Sample Page
  • Get Started
Jue. Abr 16th, 2026
Trending News: Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 TrafficObsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto AttacksHidden Passenger? How Taboola Routes Logged-In Banking Sessions to TemuDefender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your EnvironmentCisco Patches Four Critical Identity Services, Webex Flaws Enabling Code ExecutionUAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaignn8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing EmailsApril Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and MoreActively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server TakeoverThe Architecture Exposure Validation RequiresMicrosoft Issues Patches for SharePoint Zero-Day and 168 Other New VulnerabilitiesOpenAI Launches GPT-5.4-Cyber with Expanded Access for Security TeamsNew PHP Composer Flaws Enable Arbitrary Command Execution — Patches ReleasedAI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad FraudGoogle Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance SecurityMirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta AdsAnalysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 UsersCISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched ServersJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud AttemptsFiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and MoreYour MTTD Looks Great. Your Post-Alert Gap Doesn’tNorth Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT MalwareOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain IncidentAdobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor DownloadsLaw Enforcement Used Webloc to Track 500 Million Devices via Ad DataGlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of DisclosureBrowser Extensions Are the New AI Consumption Channel That No One Is Talking AboutGoogle Rolls Out DBSC in Chrome 146 to Block Session Theft on WindowsBackdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend ServersEngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto WalletsUAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing CampaignsBitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA RegionHybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More StoriesAdobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025The Hidden Security Risks of Shadow AI in EnterprisesNew Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS ProxyMasjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT DevicesAPT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO AlliesShrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major SystemsN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, RustIran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCsRussian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking CampaignDocker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host AccessThe Hidden Cost of Recurring Credential IncidentsOver 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise RiskNew GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-FlipsChina-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa RansomwareFlowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances ExposedIran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 OrganizationsDPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South KoreaAxios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and MoreHow SOCs Close a Critical Risk in 3 StepsHow LiteLLM Turned Developer Machines Into Credential Vaults for AttackersQilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR ToolsBKA Identifies REvil Leaders Behind 130 German Ransomware Attacks$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering OperationFortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent ImplantsChina-Linked TA416 Targets European Governments with PlugX and OAuth-Based PhishingMicrosoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux ServersWhy Third-Party Risk Is the Biggest Gap in Your Clients’ Security PostureUNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain AttackDrift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRKNew SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase ImagesHackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal CredentialsCisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System CompromisePre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More StoriesThe State of Trusted Open Source ReportResearchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto MinersWhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces ActionApple Expands iOS 18.7.7 Update to More Devices to Block DarkSword ExploitCERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million EmailsNew Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch ReleasedCasbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF LuresMicrosoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC BypassBlock the Prompt, Not the Work: The End of "Doctor No"3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069Claude Code Source Leaked via npm Packaging Error, Anthropic ConfirmsAndroid Developer Verification Rollout Begins Ahead of September EnforcementTrueConf Zero-Day Exploited in Attacks on Southeast Asian Government NetworksThe AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom PriorityVertex AI Vulnerability Exposes Google Cloud Data and Private ArtifactsSilver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake DomainsAxios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm AccountOpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token VulnerabilityDeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials3 SOC Process Fixes That Unlock Tier 1 ProductivityTelecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and MoreThe State of Secrets Sprawl 2026: 9 Takeaways for CISOsRussian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP TunnelsThree China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Chicago 12, Melborne City, USA
  • Home
  • Blog
  • Sample Page
The Digital Fortress
  • Get Started

Etiqueta Plugin

  1. Inicio
  2. Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
  • adminadmin
  • Abuse
  • Attacks
  • abril 16, 2026
  • 0 Comentarios
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

Ravie LakshmananApr 16, 2026Application Security / Threat Intelligence A «novel» social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a…

Continue reading

Recent Posts

  • Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
  • Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
  • Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
  • Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
  • [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

Recent Comments

No hay comentarios que mostrar.

Archives

  • abril 2026
  • marzo 2026
  • febrero 2026

Categories

  • Uncategorized

Other Story

Uncategorized

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

  • admin
  • abril 16, 2026
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
Uncategorized

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

  • admin
  • abril 16, 2026
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
Uncategorized

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

  • admin
  • abril 16, 2026
Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
Uncategorized

Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

  • admin
  • abril 16, 2026
Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
Uncategorized

[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

  • admin
  • abril 16, 2026
[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
Uncategorized

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

  • admin
  • abril 16, 2026
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Copyright © 2026 The Digital Fortress | Powered by Desert Themes
Back to Top