Blog

  • New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2).
    The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria.
    “TrickMo relies on a runtime-loaded APK  (dex.module),

  • Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

    Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

    Why do the Riskiest SOC Alerts Go Unanswered?
    Security operations teams are drowning in alerts. But the real problem isn’t always alert volume; it’s the blind spots. The most dangerous alerts are the ones no one is investigating.
    A recent report from The Hacker News examined why certain high-risk alert categories – WAF, DLP, OT/IoT, dark web intelligence, and supply chain signals- consistently

  • Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

    Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

    TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign.
    The affected npm packages have been modified to include an obfuscated JavaScript file (“router_init.js”) that’s designed to profile the execution

  • Why Agentic AI Is Security’s Next Blind Spot

    Why Agentic AI Is Security’s Next Blind Spot

    Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — most likely without meaningful involvement from the security team. The industry conversation has largely framed this as a question of policy: allow it, restrict it, or monitor it? However, that framing misses the point. 
    The more urgent

  • Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    American educational technology company Instructure, the parent company of Canvas, said it reached an “agreement” with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools and universities.
    In an update shared on Monday, the Utah-based firm said it “reached an agreement with the unauthorized actor involved in

  • ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More

    ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More

    Rough Monday.
    Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still getting into boxes with bugs that should’ve died years ago — the same old holes, same lazy access paths, same “how the hell is this still open” feeling. One report this week basically reads like a guy tripped over root access by accident and decided to stay

  • Your Purple Team Isn’t Purple — It’s Just Red and Blue in the Same Room

    Your Purple Team Isn’t Purple — It’s Just Red and Blue in the Same Room

    Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that’s longer than the exploitation window itself.
    Nobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its

  • Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

    Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

    A malicious Hugging Face repository managed to take a spot in the platform’s trending list by impersonating OpenAI’s Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users.
    The project, named Open-OSS/privacy-filter, masqueraded as its legitimate counterpart released by OpenAI late last month (openai/privacy-filter), including copying the entire description

  • Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

    Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

    Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory.
    The out-of-bounds read flaw, which likely impacts over 300,000 servers globally, is tracked as CVE-2026-7482 (CVSS score: 9.1). It has been codenamed Bleeding Llama by Cyera.
    Ollama is a

  • cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

    cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

    cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service.
    The list of vulnerabilities is as follows –

    CVE-2026-29201 (CVSS score: 4.3) – An insufficient input validation of the feature file name in the “feature::LOADFEATUREFILE” adminbin call that could result