Blog

  • Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers’ systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling.
    “QLNX targets developers and DevOps credentials across the software supply chain,”

  • One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

    One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

    The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than 25 million security alerts, including informational and low-severity, across live enterprise environments. 
    The dataset behind these findings includes 10 million monitored

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that’s being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called “darkworm.”
    The backdoor is designed as a Pluggable Authentication Module (PAM)-based post-exploitation toolkit that enables persistent SSH access by means of a magic password and specific TCP port combination.

  • Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

    Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

    Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel.
    Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacting the Linux kernel that has since come under active exploitation in the wild. The vulnerability was reported to Linux kernel maintainers

  • One Click, Total Shutdown: The “Patient Zero” Webinar on Killing Stealth Breaches

    One Click, Total Shutdown: The “Patient Zero” Webinar on Killing Stealth Breaches

    The hardest part of cybersecurity isn’t the technology, it’s the people.
    Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one “Patient Zero” infection.
    In 2026, hackers are using AI to make these “first clicks” nearly impossible to spot. If a single laptop gets compromised on your watch, do you have a plan to stop it from taking down

  • PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

    PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

    Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026.
    The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the User-ID Authentication Portal service of Palo Alto Networks PAN-OS software that could allow an unauthenticated attacker

  • ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

    ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

    Bad week.
    Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of these attack chains don’t even feel sophisticated anymore. More like some tired guy with a Telegram account and too much free time. The worst part is how often this stuff

  • Day Zero Readiness: The Operational Gaps That Break Incident Response

    Day Zero Readiness: The Operational Gaps That Break Incident Response

    Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness determines whether that team can do meaningful work the moment they do. 
    That distinction matters far more than many organizations realize. In the first hours of a security incident

  • PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

    PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

    Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems.
    “While these wheel packages do implement the features described on their PyPI web pages, their true purpose is to covertly deliver malicious files,” Kaspersky 

  • MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

    MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

    The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a “false flag” operation.
    The attack, observed by Rapid7 in early 2026, has been found to leverage social engineering techniques via Microsoft Teams to initiate the infection sequence. Although the incident