Back to Blog

#Threat Intel

18 posts
Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack

Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack

Trivy GitHub Action compromise exposed CI/CD secrets in a stealth supply-chain attack A supply-chain compromise in Aqua Security’s aquasecurity/trivy-action sho...

March 22, 2026
4 min read
Namibia Airports Company breach claim raises admin-access risk

Namibia Airports Company breach claim raises admin-access risk

Namibia Airports Company breach claim raises admin-access risk | 2026 Executive Summary Namibia Airports Company (NAC) disclosed that it detected a cybersecurit...

March 21, 2026
6 min read
GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push GlassWorm is no longer just a story about obviously malicious extensions. Th...

March 21, 2026
5 min read
FBI seizes Handala sites after destructive Stryker hack

FBI seizes Handala sites after destructive Stryker hack

FBI seizes Handala sites after destructive Stryker hack | 2026 Executive Summary The FBI and U.S. Department of Justice have seized two websites linked to Handa...

March 19, 2026
6 min read
DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [exploit](https://...

March 19, 2026
6 min read
DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword shows how iPhone zero-days spread far beyond a single operator Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [...

March 19, 2026
6 min read
Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations

Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations

Slopoly Shows How AI-Generated Malware Is Entering Ransomware Operations | 2026 Executive Summary IBM X-Force says a ransomware-linked intrusion involved a like...

March 17, 2026
4 min read
Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation

Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation

Cisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation | 2026 Executive Summary CVE-2026-20122 and CVE-2026-20128 have turned Cisco's SD-...

March 16, 2026
6 min read
Google Warns Chrome Users to Update Now as Two Zero-Days Are Exploited

Google Warns Chrome Users to Update Now as Two Zero-Days Are Exploited

Google Warns Chrome Users to Update Now as Two Zero-Days Are Exploited | 2026 Executive Summary Google has pushed an emergency Chrome update after confirming th...

March 15, 2026
6 min read
Chrome Zero-Days CVE-2026-3909 and CVE-2026-3910 Hit KEV

Chrome Zero-Days CVE-2026-3909 and CVE-2026-3910 Hit KEV

Chrome Zero-Days CVE-2026-3909 and CVE-2026-3910 Hit KEV | 2026 Executive Summary CVE-2026-3909 and CVE-2026-3910 became an urgent enterprise patching priority...

March 14, 2026
7 min read
TELUS Digital breach: ShinyHunters claims 1PB data theft

TELUS Digital breach: ShinyHunters claims 1PB data theft

TELUS Digital breach: ShinyHunters claims 1PB data theft | 2026 Executive Summary TELUS Digital confirmed on March 12, 2026 that it is investigating unauthorize...

March 12, 2026
7 min read
Doppelgänger backend leak maps 100+ disinformation domains

Doppelgänger backend leak maps 100+ disinformation domains

Doppelgänger: backend artifacts map 100+ disinformation domains | 2026 Executive Summary Researchers tracking Russia-linked influence operations say backend art...

March 11, 2026
8 min read