News
North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
2+ hour, 52+ min ago (842+ words) The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code…...
We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them
15+ hour, 38+ min ago (212+ words) AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful " but it's also what…...
Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
19+ hour, 3+ min ago (641+ words) The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library. "New image tags 0.69.5 and 0.69.6 were pushed on March 22 without corresponding GitHub releases or tags. Both images…...
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
2+ day, 19+ hour ago (397+ words) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch them by April 3, 2026. The vulnerabilities that have come…...
Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
2+ day, 13+ hour ago (612+ words) The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that have led to the compromise of a large number of npm packages with a previously undocumented self-propagating worm dubbed…...
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
3+ day, 11+ hour ago (580+ words) The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks'The Hacker News Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to…...
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
3+ day, 11+ hour ago (392+ words) Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover. The vulnerability has been codenamed PolyShell by Sansec owing to the fact…...
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
4+ day, 8+ hour ago (504+ words) Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. "Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard…...
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
3+ day, 3+ hour ago (297+ words) Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets. The latest incident impacted GitHub Actions "aquasecurity/trivy-action" and "aquasecurity…...
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
3+ day, 12+ hour ago (541+ words) A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security defect, tracked as CVE-2026-33017 (CVSS score: 9.3), is a case of missing…...