GitGuardian State of Secrets Sprawl 2026: AI, DevOps and the Explosion of Machine Identities

Futuristic scene depicting a robot and hackers in a cyber heist with a giant padlock.

The latest GitGuardian State of Secrets Sprawl 2026 report shows that hardcoded secrets in code and infrastructure are not just a persistent problem – they are accelerating rapidly. In 2025, GitGuardian detected 29 million new secrets on public GitHub, a 34% year‑over‑year increase and the sharpest rise since the report began. Hardcoded secrets on GitHub … Read more

Chinese Cyber Espionage Operation Targets Southeast Asian Government with USB Malware and Advanced RATs

Chessboard filled with strategy elements and mysterious figures in a dimly lit space.

A government organization in Southeast Asia has been hit by a large-scale cyber espionage campaign that Palo Alto Networks’ Unit 42 describes as “sophisticated and well-resourced.” The investigation points to three coordinated activity clusters with links to China-nexus threat actors, working in parallel to achieve long-term access to sensitive government systems. Three Coordinated Threat Clusters … Read more

Iran-Linked Handala Hack Team Targets FBI Email and Stryker in Destructive Cyber Attacks

** Intense cybercrime scene with FBI agent, hackers, and ominous cityscape.

The Iran-aligned Handala Hack Team, believed to be operating on behalf of Iran’s Ministry of Intelligence and Security (MOIS), has claimed responsibility for breaching the personal email account of senior FBI official Kash Patel and leaking an archive of his messages and files. The incident highlights the growing sophistication of Iranian state-backed cyber operations that … Read more

Citrix NetScaler CVE-2026-3055: Critical SAML IDP Vulnerability Under Active Reconnaissance

Modern city skyline with technology installations alongside a river.

A new critical vulnerability in Citrix NetScaler ADC and Citrix NetScaler Gateway, tracked as CVE-2026-3055 with a CVSS score of 9.3, has already drawn the attention of threat actors. Security researchers from Defused Cyber and watchTowr report active internet-wide reconnaissance for vulnerable instances, indicating that attackers are preparing for large-scale exploitation once reliable methods are … Read more

CVE-2025-53521: Critical F5 BIG-IP APM Vulnerability Added to CISA KEV

Soldiers in a dark tech environment monitor remote code execution alerts.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in F5 BIG-IP Access Policy Manager (APM), tracked as CVE-2025-53521, to its Known Exploited Vulnerabilities (KEV) catalog. This confirms the vulnerability is being actively exploited in real-world attacks and significantly raises the urgency for organizations relying on F5 for remote access and … Read more

Apple Issues Urgent Security Warnings Over Coruna and DarkSword iOS Exploits

Contrast between dark, chaotic elements and a bright, secure digital world on smartphones.

Apple has begun displaying critical system alerts directly on the lock screen of iPhone and iPad devices running outdated versions of iOS and iPadOS. These prominent warnings inform users that their software is being actively targeted by real-world attacks delivered through malicious web content and urge them to install security updates immediately. What Apple’s Lock … Read more

Telnyx PyPI Supply Chain Attack Uses Audio Steganography to Target Python Developers

Aerial view of San Francisco with a control center overlooking the city and bay.

A new phase in an ongoing software supply chain attack campaign has compromised the popular Python package Telnyx, with malicious releases published to PyPI. The activity is attributed to the threat group TeamPCP, previously linked to the compromise of tools such as Trivy, KICS and the litellm library. In this incident, the attackers uploaded two … Read more

LangChain and LangGraph Vulnerabilities Expose LLM Applications to Sensitive Data Leaks

Two professionals analyze AI security threats in a futuristic control room.

Security researchers have disclosed three vulnerabilities in the popular AI development frameworks LangChain and LangGraph that can lead to leakage of filesystem data, environment secrets and user conversation history. These weaknesses affect enterprise deployments of large language model (LLM) applications and demonstrate that AI infrastructure is subject to the same classic security flaws as any … Read more

Axios npm Supply Chain Attack Installs Cross-Platform RAT via Malicious Dependency

Team of programmers in a dark office resolving a coding emergency at their computers.

The widely used JavaScript HTTP client Axios has been at the center of a significant npm supply chain attack, in which attackers slipped a malicious dependency into selected releases to deploy a cross‑platform remote access trojan (RAT). Given Axios’s more than 83 million weekly downloads, even a short‑lived compromise creates serious systemic risk. Malicious Axios … Read more