Chinese Cyber-Espionage Group TA416 Renews Attacks on EU, NATO and Middle East

Tense discussion in a high-tech command center with multiple monitors and flags.

Chinese-aligned threat actor TA416 has restarted large-scale cyber-espionage operations against European governmental and diplomatic entities and is now extending its focus to the Middle East. According to research attributed to Proofpoint, after nearly a two‑year lull in Europe, TA416 has, since mid‑2025, again been systematically targeting diplomatic missions to the European Union (EU) and NATO … Read more

Axios npm Package Compromised in Targeted Supply Chain Attack Linked to UNC1069

Man looks stressed at a computer, facing a system update warning and coding screens.

The Axios JavaScript library, one of the most downloaded packages in the npm ecosystem with around 100 million weekly installs, has been at the center of a carefully orchestrated software supply chain attack. The incident was not caused by a coding flaw, but by a highly targeted social engineering operation that compromised the maintainer’s credentials … Read more

Malicious npm Strapi Plugins Highlight Escalating Software Supply Chain Threats

Dark digital landscape featuring a hooded figure and technology-themed plugin boxes.

A campaign involving 36 malicious npm packages disguised as plugins for the Strapi CMS has exposed how easily attackers can weaponize the open source software supply chain. The packages were designed to exploit Redis and PostgreSQL, deploy reverse shells, steal credentials, and install persistent implants on compromised systems. Malicious npm packages masquerading as Strapi plugins … Read more

North Korean APTs Turn GitHub and Dropbox into Stealthy C2 Infrastructure

Chessboard and computer setup, hinting at a strategic digital landscape.

North Korean state-linked threat actors are increasingly abusing legitimate cloud services such as GitHub and Dropbox as covert command-and-control (C2) channels, making their operations harder to detect and block. Recent investigations by Fortinet FortiGuard Labs, AhnLab and S2W highlight a series of campaigns targeting South Korean organizations that rely on LNK phishing, PowerShell scripts, Python … Read more

Linux Servers Under Fire from Cookie-Controlled PHP Web Shell Attacks

Hacker at computer surrounded by tech elements and malicious cookies.

Linux web servers are facing a rise in attacks where adversaries use HTTP cookies as a covert control channel for PHP web shells. According to the Microsoft Defender Security Research Team, this method enables attackers to maintain remote access and execute commands on compromised hosts while blending almost seamlessly into normal web traffic. How cookie-controlled … Read more

Drift Protocol Hack on Solana: Durable Nonce Abuse, Fake Token Collateral and a Suspected DPRK Link

Dark, surreal artwork depicting a tornado of money and hidden threats.

The decentralized derivatives exchange Drift Protocol, built on the Solana blockchain, has confirmed a major security incident: on 1 April 2026, an attacker siphoned approximately $285 million from the platform. The case is already being viewed as a landmark DeFi attack because it did not rely on a smart contract bug, but instead exploited governance … Read more

Why SOC Teams Need Cross-Platform Malware Analysis to Stop Multi-OS Attacks

Penguin character on a chessboard, chained to a king piece with a warning phone.

Enterprise attack surfaces are no longer defined by a single operating system. Corporate environments typically combine Windows workstations, macOS laptops for executives and developers, Linux servers and mobile devices into one interconnected digital ecosystem. Threat actors move laterally across this mix with ease, while many Security Operations Centers (SOC) still investigate incidents separately by platform, … Read more

Apple Expands iOS 18.7.7 Security Update to Fight DarkSword Exploit Kit

Three individuals engaged with sleek devices in a dark, dystopian setting.

Apple has taken the unusual step of broadening access to the iOS 18.7.7 and iPadOS 18.7.7 security update for a significantly larger range of devices. The move is a direct response to the DarkSword exploit kit, a powerful tool used in targeted cyber‑espionage campaigns that can silently compromise iPhones and iPads via normal web browsing. … Read more

CERT-UA Exposes AGEWHEEZE RAT Distributed via AI-Enhanced Phishing Campaign

Hacker scene with dark atmosphere, cybersecurity themes, and Ukraine flag on display.

The Ukrainian Computer Emergency Response Team (CERT-UA) has disclosed a new targeted phishing campaign in which attackers masqueraded as the national cybersecurity agency to distribute the AGEWHEEZE remote access trojan (RAT). The incident illustrates how threat actors increasingly combine brand impersonation, social engineering and artificial intelligence (AI) to make phishing attacks more convincing and harder … Read more