Water Saci’s Casbaneiro–Horabot Phishing Campaign Targets Latin America and Europe

Digital artwork contrasting cybersecurity threats and communication tools.

A large-scale, multi-stage phishing campaign is targeting Spanish-speaking users in enterprises across Latin America and several European countries. The operation aims to quietly deploy Windows banking trojans, primarily Casbaneiro (also known as Metamorfo), with the Horabot malware family acting as an auxiliary spreading and spam module. Water Saci / Augmented Marauder: Brazilian Banking Malware Operation … Read more

New WhatsApp Malware Campaign Uses VBS Scripts and AnyDesk for Stealthy Remote Access

Man using a smartphone in a dimly lit control room with colleagues nearby.

Microsoft Defender researchers have identified a new targeted WhatsApp malware campaign that distributes malicious VBS scripts and establishes long-term remote access to compromised Windows systems. The activity, observed since late February 2026, relies on a multi‑stage infection chain, extensive use of legitimate tools and cloud services, and systematic weakening of built‑in security controls. How the … Read more

North Korean UNC4736 Linked to $285M Solana DeFi Hack on Drift Exchange

North Korean hacker at a computer amidst symbolic elements of finance and technology.

On 1 April 2026, the Solana-based decentralized exchange Drift suffered a theft of approximately $285 million, in what now appears to be the culmination of a multi‑stage operation attributed to the Democratic People’s Republic of Korea (DPRK). According to Drift’s incident analysis, the attackers spent at least six months preparing, combining long‑term social engineering with … Read more

Chrome Zero-Day CVE-2026-5281: Critical WebGPU Vulnerability Under Active Exploitation

Tense cybersecurity professionals reacting to a severe warning on their screens.

Google has released an unscheduled Chrome security update that patches 21 vulnerabilities, including an actively exploited zero-day vulnerability CVE-2026-5281. The company has confirmed that real-world attacks are already leveraging this flaw, making rapid patching essential for both home users and corporate environments. What the Chrome zero-day CVE-2026-5281 is and how it works The vulnerability CVE-2026-5281 … Read more

Living off the Land Attacks: How to Control Your Internal Attack Surface

Cybersecurity analyst monitors threat alerts on multiple screens in a dark room.

Security models built around the principle of “find the malicious file, block the attack” are rapidly losing effectiveness. Modern adversaries increasingly avoid classic malware and instead weaponize what is already present inside corporate networks: built-in administrative tools, trusted operating system binaries, and native scripting engines. This tactic, known as Living off the Land (LOTL), turns … Read more

Axios npm Package Compromised in North Korean Supply Chain Attack Targeting Developers

Contrast of cybersecurity: ethical coding vs. sinister hacking under dramatic lighting.

The widely used JavaScript HTTP client Axios has become the center of a significant software supply chain attack. Google Threat Intelligence has attributed the compromise of the Axios npm package to the North Korea–linked group UNC1069, known for financially motivated operations against the cryptocurrency sector and software developers. North Korean UNC1069 Group Compromises Popular Axios … Read more

Google Rolls Out Mandatory Android Developer Verification as Apple Tightens Wearable Privacy Rules

Man working on app verification with software screens, showing statuses and alerts.

Major platform providers are simultaneously raising the bar for mobile security. Google is introducing mandatory identity verification for Android developers distributing apps outside Google Play, while Apple is tightening how third‑party wearables access iOS notifications and activity data. Together, these steps reflect a broader trend: large ecosystems are asserting more control over who can ship … Read more

AtlasCross RAT: Silver Fox Targets Chinese-Speaking Users via Fake VPN and Messaging Sites

Mysterious figure with fox head uses a laptop amid dark, eerie surroundings.

A large-scale malware campaign is distributing a new remote access trojan, AtlasCross RAT, by impersonating popular VPN, messaging, video conferencing and cryptocurrency services. According to German security firm Hexastrike, the operation primarily targets Chinese-speaking users through highly convincing look‑alike domains that mimic brands such as Surfshark VPN, Signal, Telegram, Zoom and Microsoft Teams. Typosquatted domains … Read more

ChatGPT DNS Data Exfiltration Vulnerability and OpenAI Codex Command Injection Raise AI Security Concerns

Close-up of an Ethernet cable plugged into a circuit board with glowing indicators.

Recent research by Check Point and BeyondTrust Phantom Labs has revealed critical security weaknesses in two widely used OpenAI services: ChatGPT and OpenAI Codex. The findings demonstrate how advanced attackers could silently exfiltrate data, hijack developer workflows and abuse large language model (LLM) agents as new entry points into corporate infrastructure. ChatGPT vulnerability: covert DNS … Read more

GitGuardian State of Secrets Sprawl 2026: AI, DevOps and the Explosion of Machine Identities

Futuristic scene depicting a robot and hackers in a cyber heist with a giant padlock.

The latest GitGuardian State of Secrets Sprawl 2026 report shows that hardcoded secrets in code and infrastructure are not just a persistent problem – they are accelerating rapidly. In 2025, GitGuardian detected 29 million new secrets on public GitHub, a 34% year‑over‑year increase and the sharpest rise since the report began. Hardcoded secrets on GitHub … Read more