How the Mini Shai-Hulud Worm Compromised npm and PyPI Supply Chains

Giant worm labeled "Mini Shai-Hulud" emerging from a box with package icons.

Mini Shai-Hulud, linked to the TeamPCP group, has become one of the most dangerous worms in the npm and PyPI ecosystems: it compromised TanStack, UiPath, Mistral AI, OpenSearch and Guardrails AI packages by publishing malicious versions through legitimate GitHub Actions with valid SLSA signatures and then automatically spreading to other packages owned by the same … Read more

TrickMo C turns infected Androids into TON-based proxy nodes

Android Trojan graphic depicting malware activity and cryptocurrency connections.

Researchers at ThreatFabric have identified a new variant of the Android trojan TrickMo, which uses the decentralized network The Open Network (TON) to control infected devices. The variant, designated TrickMo C, was observed in January–February 2026 and, according to the researchers, targets users of banking apps and cryptocurrency wallets in France, Italy, and Austria. The … Read more

RubyGems blocks new registrations after suspected malware campaign

Red diamond under dome with locks surrounded by boxes and bugs.

RubyGems — the standard package manager for the Ruby programming language — has temporarily blocked new account registration after an incident that is being described as a large-scale malicious attack. According to available information, hundreds of packages are involved in the attack. Everyone who uses Ruby dependencies in their projects should audit recently added packages … Read more

Critical GnuTLS Use-After-Free Vulnerability in Exim (CVE-2026-45185)

Exim server illustration highlighting CVE-2026-45185 vulnerability.

The Exim project has released an emergency security update that fixes the CVE-2026-45185 use-after-free vulnerability, which leads to heap corruption and potentially allows arbitrary code execution on the mail server. The vulnerability affects all Exim versions from 4.97 through 4.99.2 inclusive that are built with GnuTLS support (build parameter USE_GNUTLS=yes). To exploit it, an attacker … Read more

GemStuffer campaign turns RubyGems into free data infrastructure

Illustration of data flow involving RubyGems and storage misuse.

Researchers at Socket discovered a campaign called GemStuffer, in which more than 150 packages were uploaded to the RubyGems repository with an unusual goal — to use the package registry not to distribute malicious code to developers, but as a channel for storing and retrieving data collected from UK local government portals. The campaign affects … Read more

How Microsoft’s May 2026 Patch Tuesday Impacts Windows, Azure and AD

Shield graphic featuring "138 Critical Fixes" for Microsoft software updates.

Microsoft in the May Patch Tuesday 2026 closed 138 vulnerabilities in Windows and cloud services, including critical flaws in Windows DNS, Netlogon, Azure, Dynamics 365, and Entra ID, while at the same time announcing enforced rotation of Secure Boot certificates by June 26, 2026. Organizations with domain environments, Dynamics-based CRM, and active Azure usage must … Read more

Inside QLNX: a stealthy Linux implant stealing developer secrets

Quasar Linux RAT visualization connecting various tech and secrets.

Trend Micro researchers have described a previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX), which, according to their findings, targets systems used by developers and DevOps engineers with the goal of stealing credentials that provide access to package registries, cloud infrastructure, and CI/CD pipelines. The malware is reported to execute filelessly from memory, use … Read more

How Low-Priority Alerts and EDR ‘Mitigations’ Hide Real Threats

Magnifying glass focusing on a low-priority alert with EDR shield graphic.

A study covering more than 25 million security alerts in real corporate environments revealed a structural issue: almost 1% of confirmed incidents originated from notifications initially classified as low-priority or informational. On endpoints, this figure reached 2%. With an average volume of 450,000 alerts per organization per year, this translates into roughly 54 real threats … Read more

Critical PAN-OS buffer overflow in User-ID portal under attack

Palo Alto firewall with error message illustrating CVE-2026-0300 vulnerability.

Palo Alto Networks has confirmed limited active exploitation of the critical vulnerability CVE-2026-0300 in its PAN-OS software. This buffer overflow vulnerability in the User-ID Authentication Portal service allows an unauthenticated attacker to execute arbitrary code with root privileges by sending specially crafted network packets. According to researchers, the first exploitation attempts were observed on April … Read more

vm2 sandbox escapes raise concerns over JavaScript isolation

6abba4e8 6dcf 4210 b738 9b2b55907d16 2

Critical vulnerabilities have been discovered in the vm2 library, a popular tool for running untrusted JavaScript code in an isolated Node.js environment. These flaws make it possible to break out of the sandbox and execute arbitrary code on the host system. A previously identified vulnerability, CVE-2026-22709, received a 9.8 out of 10 CVSS score, which … Read more