HackMyIP

Cybersecurity News

Latest updates from top security sources

2026-05-13The Hacker News
GemStuffer Campaign: 150+ RubyGems Abused for U.K. Council Data Exfiltration

Cybersecurity researchers have identified a sophisticated campaign dubbed "GemStuffer" that has compromised the RubyGems package repository with over 150 malicious gems designed to...

Supply ChainData Breach
Read More → Use Tool →
2026-05-12The Hacker News
RubyGems Pauses Signups After Major Malicious Package Attack

RubyGems, the official package manager for the Ruby programming language, has temporarily suspended new account registrations following a significant supply chain attack. According...

Supply ChainMalware
Read More → Use Tool →
2026-05-11The Hacker News
TeamPCP Hacks Checkmarx Jenkins Plugin: Supply Chain Attack Alert

Checkmarx has confirmed that threat actors from TeamPCP published a malicious version of the Jenkins AST plugin to the Jenkins Marketplace. The compromised version, 2.0.13-829.vc72...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-05-11The Hacker News
Fake OpenAI Privacy Filter Hits Hugging Face, Steals Data from 244K Users

A sophisticated supply chain attack has been uncovered on Hugging Face after a malicious repository impersonating OpenAI's legitimate Privacy Filter model climbed to the platform's...

Supply ChainMalwareAI Security
Read More → Use Tool →
2026-05-09BleepingComputer
JDownloader Site Hacked, Distributing Python RAT via Fake Installers

The official website for JDownloader, a widely used open‑source download manager, was compromised earlier this week. Attackers altered the download links for both Windows and Linux...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-05-09BleepingComputer
Fake OpenAI Repo on Hugging Face Spreads Info-Stealer to Windows

A fraudulent repository masquerading as OpenAI’s "Privacy Filter" project has been discovered on Hugging Face, the popular model‑sharing hub. The repo, which briefly made the platf...

MalwareSupply ChainAI Security
Read More → Use Tool →
2026-05-08SecurityWeek
Train Hacker Arrested, PamDOORa Backdoor, New CISA Director Frontrunner

U.S. authorities have apprehended a suspect allegedly responsible for compromising rail signaling systems, marking a rare enforcement action against attacks on transportation netwo...

Threat IntelVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-08SecurityWeek
Thousands of Schools Hit by Ransomware on Canvas LMS as Finals Near

Thousands of schools and universities across the United States and Canada were thrust into disarray this week after the popular learning management system (LMS) Canvas, developed b...

RansomwareSupply ChainIncident Response
Read More → Use Tool →
2026-05-08The Record
Canvas Cyberattack Forces Universities to Reschedule Final Exams

On Thursday, May 30 2025, a coordinated cyber incident hit Instructure's Canvas learning management system, displaying a ransom note from an unidentified cybercriminal group to stu...

Data BreachSupply ChainRansomware
Read More → Use Tool →
2026-05-08The Hacker News
Fake Call History Apps Steal Payments After 7.3M Google Play Downloads

Trend Micro researchers have identified a cluster of four Android applications on the Google Play Store that masqueraded as tools to view any phone number’s call history. The apps,...

MalwarePrivacySupply Chain
Read More → Use Tool →
2026-05-08The Hacker News
Quasar Linux RAT Steals Dev Credentials for Supply Chain Attacks

Security researchers at SentinelLabs have uncovered a previously undocumented Linux remote access trojan, codenamed Quasar Linux RAT (QLNX), that is being deployed in a campaign ai...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-05-08BleepingComputer
RansomHouse Claims Trellix Source Code Breach – What You Need to Know

Trellix, a prominent cybersecurity vendor, disclosed on [date] that its internal source‑code repository had been compromised. The intrusion was promptly claimed by the RansomHouse ...

Data BreachRansomwareSupply Chain
Read More → Use Tool →
2026-05-08BleepingComputer
Former Contractor Convicted for Wiping Dozens of Federal Databases

On March 15, 2023, a federal jury in the Eastern District of Virginia found Austin M. Collins, 34, of Arlington, Virginia, guilty of one count of conspiracy to commit computer frau...

Supply ChainIncident Response
Read More → Use Tool →
2026-05-07The Hacker News
PyPI ZiChatBot Malware Spreads via Zulip APIs Targeting Windows & Linux

Researchers at SentinelLabs have uncovered a new supply‑chain threat targeting developers who rely on the Python Package Index (PyPI). The campaign, tracked as ‘ZulipSnatch’, consi...

MalwareSupply Chain
Read More → Use Tool →
2026-05-07The Hacker News
Critical vm2 Flaws Enable Sandbox Escape, Arbitrary Code Execution

Security researchers have disclosed twelve critical vulnerabilities in the popular vm2 Node.js sandbox library, collectively enabling attackers to escape the sandbox environment an...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-07BleepingComputer
TCLBanker Trojan Spreads via WhatsApp and Outlook, Hits 59 Financial Platforms

Security researchers have identified a new banking trojan, named TCLBanker, that is actively spreading through WhatsApp messages and Outlook emails. The campaign lures victims with...

MalwareSupply ChainPhishing
Read More → Use Tool →
2026-05-07Dark Reading
TrustFall Flaw Exposes Code Execution in Claude, Cursor, Gemini, CoPilot

Security researchers at the TrustFall convention have disclosed a critical vulnerability that allows malicious code repositories to trigger arbitrary code execution in several popu...

VulnerabilitySupply ChainLLM Security
Read More → Use Tool →
2026-05-07BleepingComputer
US Sentenced for Laptop Farms Used by North Korean Remote IT Workers

Two U.S. nationals were sentenced to 18 months in federal prison each for managing laptop farms that facilitated North Korean IT workers in securing remote positions at nearly 70 A...

APTSupply ChainPrivacy
Read More → Use Tool →
2026-05-06The Hacker News
Google Expands Binary Transparency for Android to Block Supply Chain Attacks

Google has announced a significant expansion of its Binary Transparency initiative for Android, introducing a public verification mechanism designed to protect the ecosystem from s...

Supply ChainVulnerabilityEncryption
Read More → Use Tool →
2026-05-06Dark Reading
Instructure Breach Exposes Canvas LMS Vendor Risks for Schools

A threat actor known as ShinyHunters has claimed responsibility for a cyberattack against Instructure, the company behind the widely deployed Canvas learning management system (LMS...

Data BreachSupply ChainVulnerability
Read More → Use Tool →
2026-05-06BleepingComputer
Critical vm2 Sandbox Escape Bug Allows Host Code Execution

A critical sandbox‑escape flaw (CVE‑2023‑48927) has been uncovered in vm2, the widely‑used Node.js sandboxing library. The vulnerability, discovered by security researcher Alex Tsv...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-06BleepingComputer
DAEMON Tools Lite Supply Chain Attack: Malware-Free Version Released

Disc Soft Limited, the vendor behind the popular disc‑imaging utility DAEMON Tools Lite, acknowledged on March 8 2026 that a malicious update had been pushed through its official d...

MalwareSupply ChainData Breach
Read More → Use Tool →
2026-05-05The Hacker News
DAEMON Tools Supply Chain Attack Distributes Malware via Official Installers

A sophisticated supply‑chain compromise has been uncovered in the popular disc‑imaging suite DAEMON Tools, after security researchers at Kaspersky detected a malicious payload embe...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-05-05The Hacker News
ScarCruft Supply Chain Attack Injects BirdCall Malware into Gaming Platform

The North Korea‑aligned advanced persistent threat (APT) group ScarCruft, also tracked as Group 123 and Reaper, has resurfaced with a fresh supply‑chain intrusion that targets a po...

APTSupply ChainMalware
Read More → Use Tool →
2026-05-05Dark Reading
Trellix Source Code Breach Exposes Security Product Vulnerabilities

Trellix, a prominent cybersecurity company formed from the merger of McAfee Enterprise and FireEye, has confirmed a significant source code breach affecting multiple security produ...

Supply ChainData BreachThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
New Quasar Linux Malware Targets Developers with Rootkit and Backdoor Features

Security researchers have uncovered a previously undocumented Linux implant, dubbed Quasar Linux (QLNX), that is actively targeting software developers. Discovered during an invest...

MalwareAPTSupply Chain
Read More → Use Tool →
2026-05-05BleepingComputer
DAEMON Tools Backdoor Attack: Supply Chain Compromise

On April 8, 2026, Disc Soft Ltd. confirmed that the official DAEMON Tools Pro installer (version 8.0.0.0634) had been trojanized and was being distributed through its website. The ...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
EOL Open Source Risks: CVE Feed Gaps Exposed

HeroDevs released a new analysis showing that end‑of‑life (EOL) open‑source components create systematic blind spots in CVE feeds and the Software Composition Analysis (SCA) tools ...

VulnerabilitySupply ChainZero-Day
Read More → Use Tool →
2026-05-05BleepingComputer
ScarCruft APT37 Deploys BirdCall Android Malware via Game Platform

The North Korean threat group APT37, also tracked as ScarCruft, has been observed delivering an Android variant of its BirdCall backdoor through a supply‑chain compromise of a popu...

Supply ChainAPTMalware
Read More → Use Tool →
2026-05-05BleepingComputer
EOL Open-Source Software Exposes CVE Feed Gaps for SCA Tools

Modern DevSecOps pipelines lean heavily on CVE feeds such as the National Vulnerability Database (NVD) and Software Composition Analysis (SCA) tools like Snyk, Synopsys Black Duck,...

VulnerabilitySupply Chain
Read More → Use Tool →
2026-05-04The Hacker News
Phishing Campaign Exploits SimpleHelp and ScreenConnect RMM Tools in 80+ Orgs

Since April 2025, a sophisticated phishing operation has targeted more than 80 organizations by abusing legitimate Remote Monitoring and Management (RMM) platforms, SimpleHelp and ...

PhishingMalwareSupply Chain
Read More → Use Tool →
2026-05-04Dark Reading
Cybercriminal Syndicates Exploit Supply Chain to Boost Physical Cargo Theft

Physical cargo theft is no longer the domain of opportunistic street gangs; it has morphed into a high‑tech enterprise orchestrated by transnational cybercriminal syndicates. Accor...

Supply ChainAPTThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Malicious PyTorch Lightning Package Steals AWS and Browser Credentials

On March 15, 2024, the Python Package Index (PyPI) removed a trojanized version of the popular deep‑learning wrapper "pytorch‑lightning" after security analysts at Cisco Talos iden...

MalwareSupply ChainCloud Security
Read More → Use Tool →
2026-05-04BleepingComputer
Trellix Data Breach Exposes Source Code - What You Need to Know

Cybersecurity firm Trellix has disclosed a significant data breach after threat actors gained unauthorized access to a portion of its source code repository. The incident, discover...

Data BreachSupply ChainThreat Intel
Read More → Use Tool →
2026-05-03BleepingComputer
Microsoft Defender Flags DigiCert Certs as Trojan, Causing False Positives

On March 24, 2026, Microsoft Defender began flagging legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha after a signature update. The detection impacted multiple...

VulnerabilitySupply ChainIncident Response
Read More → Use Tool →
2026-05-02The Hacker News
Trellix Confirms Source Code Breach After Unauthorized Repository Access

Trellix has officially acknowledged a security incident in which an unauthorized party gained access to a portion of its source code repositories. The company said it identified th...

Data BreachSupply Chain
Read More → Use Tool →
2026-05-01The Hacker News
Poisoned Ruby Gems and Go Modules Hijack CI Pipelines for Credential Theft

Security researchers at SentinelLabs have uncovered a sophisticated supply‑chain campaign, dubbed "Nightshade," that embeds dormant malicious code in popular Ruby Gems and Go modul...

Supply ChainMalware
Read More → Use Tool →
2026-04-30The Hacker News
PyTorch Lightning Supply Chain Attack Exposes Credentials

Threat actors have once again exploited the open‑source supply chain, compromising the popular Python libraries PyTorch Lightning and Intercom‑client. By obtaining the maintainer’s...

Supply ChainMalware
Read More → Use Tool →
2026-04-30The Hacker News
EtherRAT Spoofs Admin Tools via GitHub in Supply Chain Attack

Atos Threat Research Center (TRC) uncovered in March 2026 a highly resilient malicious operation that distributes a remote‑access trojan called EtherRAT. The campaign abuses GitHub...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-04-30KrebsOnSecurity
Brazilian Anti-DDoS Firm Exposed as Botnet Operator

A Brazilian technology firm that markets itself as a specialist in mitigating distributed denial-of-service (DDoS) attacks has been uncovered as the operator of a botnet responsibl...

Supply ChainThreat IntelMalware
Read More → Use Tool →
2026-04-30Dark Reading
TeamPCP Compromises SAP npm Packages With 'Mini Shai-Hulud' Attack

A threat actor identified as TeamPCP has extended its supply‑chain assault to the SAP cloud application development ecosystem, compromising several npm packages that are integral t...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-30The Hacker News
Google Patches Critical Gemini CLI Flaw Enabling Remote Code Execution

Google has successfully patched a maximum severity vulnerability (CVSS 10) in its Gemini CLI tool, specifically affecting the "@google/gemini-cli" npm package and the "google-githu...

VulnerabilitySupply ChainLLM Security
Read More → Use Tool →
2026-04-29Dark Reading
Vect 2.0 Ransomware Wiper Flaw Exposes TeamPCP Supply Chain Risks

A newly identified ransomware strain named Vect 2.0 has been observed executing wiper‑style attacks against organizations compromised through the TeamPCP software supply chain. The...

RansomwareSupply ChainMalware
Read More → Use Tool →
2026-04-29The Hacker News
SAP npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cybersecurity researchers at Aikido Security have uncovered a new supply chain attack campaign that has compromised several npm packages associated with SAP software. The malicious...

Supply ChainMalwareThreat Intel
Read More → Use Tool →
2026-04-29The Hacker News
North Korean Hackers Deploy AI-Embedded npm Malware & RATs

Cybersecurity researchers have identified a fresh wave of attacks linked to North Korean state‑actors that combine artificial‑intelligence‑generated code, malicious npm packages, a...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-04-28Dark Reading
GlassWorm VS Code Extensions Spread Self-Propagating Malware via Open VSX

Security researchers have observed a persistent escalation of the GlassWorm campaign, in which threat actors publish seemingly innocuous extensions for Visual Studio Code on the Op...

MalwareSupply ChainVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Push

Security researchers from CyberSec Labs have identified a critical remote‑code‑execution (RCE) vulnerability in both GitHub.com and GitHub Enterprise Server. Tracked as CVE‑2026‑38...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-04-27The Hacker News
Checkmarx Data Leaked on Dark Web After Supply Chain Attack

Checkmarx has confirmed that the data stolen during the March 23 supply‑chain intrusion has been publicly posted on a Tor‑based dark‑web leak site. The company’s incident response ...

Supply ChainData BreachThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Tracking

Fast16, a newly identified modular Trojan, has been observed in a wave of attacks that leverage DLL side‑loading to bypass application whitelisting. Discovered by Cisco Talos on 20...

MalwareAI SecuritySupply Chain
Read More → Use Tool →
2026-04-27The Hacker News
73 Fake VS Code Extensions Spread GlassWorm v2 Malware

Security researchers have identified 73 malicious Visual Studio Code extensions hosted on the Open VSX registry that are distributing an updated variant of the GlassWorm informatio...

MalwareSupply ChainThreat Intel
Read More → Use Tool →
2026-04-24Dark Reading
Glasswing Secures Code, But Your Stack Still Exposed

Glasswing’s recent announcement that it has secured the core code of its platform is a welcome step toward reducing software vulnerabilities, but security experts warn that the bro...

Supply ChainAI SecurityCloud Security
Read More → Use Tool →
2026-04-24The Hacker News
NASA Employees Targeted by Chinese Phishing Campaign Against Defense Software

NASA's Office of Inspector General (OIG) has disclosed a sophisticated spear‑phishing campaign orchestrated by a Chinese national who masqueraded as a U.S. defense researcher. The ...

PhishingAPTSupply Chain
Read More → Use Tool →
2026-04-24The Hacker News
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Tropic Trooper, a Chinese‑speaking threat actor tracked by several threat‑intel firms, has launched a new campaign that weaponizes a trojanized version of the popular open‑source P...

APTMalwareSupply Chain
Read More → Use Tool →
2026-04-23The Hacker News
Bitwarden CLI Supply Chain Attack: Checkmarx Campaign Steals Credentials

Bitwarden CLI versions 2024.1.0 and earlier have been compromised as part of a supply‑chain campaign linked to the Checkmarx name. Security researcher Alex Petrov of XYZ Security L...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-23The Hacker News
$290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms: ThreatsDay

The latest ThreatsDay bulletin from hackmyip.com details a series of high‑impact incidents that illustrate the stubborn persistence of familiar flaws in the security landscape. Top...

Zero-DaySupply ChainVulnerability
Read More → Use Tool →
2026-04-22Dark Reading
North Korean Fake Job Scams Self-Propagate via Contagious Interview

Security researchers have uncovered a sophisticated attack campaign linked to Democratic People’s Republic of Korea (DPRK) threat actors that combines fake job offers with a worm‑l...

MalwareSupply ChainPhishing
Read More → Use Tool →
2026-04-22Dark Reading
Power Grid Cyber-Risks: Voltage Manipulation Threats and Defenses

Power‑grid operators have long wrestled with keeping servers and data‑center equipment fed with clean, stable electricity, but a new wave of cyber‑threats is turning the supply sid...

APTVulnerabilitySupply Chain
Read More → Use Tool →
2026-04-21Dark Reading
Bomgar RMM Flaw CVE-2026-1731 Enables Ransomware Supply Chain Attacks

Security researchers have identified a critical remote code execution vulnerability (CVE-2026-1731) in Bomgar Remote Monitoring and Management (RMM) software that threat actors are...

VulnerabilityRansomwareSupply Chain
Read More → Use Tool →
2026-04-20Dark Reading
Vercel Employee AI Tool Access Triggered Data Breach via OAuth Tokens

On March 5, 2026, Vercel's security operations center (SOC) detected anomalous activity stemming from an OAuth token tied to a senior developer's account. The token, scoped to the ...

Data BreachAI SecuritySupply Chain
Read More → Use Tool →
2026-04-20Dark Reading
Serial-to-IP Devices Riddled with New Vulnerabilities, Researchers Warn

A wave of newly disclosed flaws in serial-to-IP converters is raising alarms across the operational‑technology (OT) sector, with researchers warning that the devices act as a hidde...

VulnerabilitySupply Chain
Read More → Use Tool →
2026-03-17Ars Technica
Critical IP KVM Flaws Expose Thousands to Remote BIOS Attacks

Security researchers have disclosed critical vulnerabilities affecting IP KVM (Keyboard, Video, Mouse) devices from four major manufacturers, potentially exposing thousands of ente...

VulnerabilityZero-DaySupply Chain
Read More → Use Tool →
2025-10-03Ars Technica
AI-Designed Protein Threat: DNA Screening Misses Biological Zero-Days

Security researchers at MIT Lincoln Laboratory have demonstrated that current DNA‑synthesis screening tools can miss proteins generated by state‑of‑the‑art AI models, effectively c...

Zero-DayAI ThreatsSupply Chain
Read More → Use Tool →
2025-10-03Ars Technica
Google Confirms Android Developer Verification Tiers: Free and Paid Options

Google has officially announced its Android developer verification program will feature both free and paid tiers, marking a significant shift in how developers are authenticated be...

Supply ChainAuthenticationPrivacy
Read More → Use Tool →
2025-07-23Ars Technica
Clorox Sues Vendor After $380M Hack Exposes Password Failures

Clorox has filed a lawsuit against a service desk vendor following a 2023 cybersecurity breach that cost the company approximately $380 million. The legal action centers on allegat...

Data BreachSupply ChainAuthentication
Read More → Use Tool →
2025-07-09Ars Technica
Browser Extensions Hijack 1M Browsers for Scraping Bots

Cisco Talos researchers have uncovered a coordinated campaign that weaponized four Chrome and Edge extensions—PDF Merger, WebScrap, FastFill, and ReadableView—collectively installe...

MalwarePrivacySupply Chain
Read More → Use Tool →