Blog

  • Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

    Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

    Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022.

    “Showboat is a modular post-exploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a SOCKS5 proxy,” Lumen

  • ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

    ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

    This week starts small.

    A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust.

    That is what makes it worrying. The danger is in normal things now – updates, apps, cloud buttons, support chats, trusted accounts. AI

  • Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

    Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

    Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild.

    The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges.

    “Improper link resolution before file access (‘link following’) in Microsoft Defender

  • When Identity is the Attack Path

    When Identity is the Attack Path

    Consider a cached access key on a single Windows machine. It got there the way most cached credentials do – a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily accessible to a minor-league attacker, could have opened a path to some 98% of entities in the company’s cloud

  • 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

    9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

    Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years.

    The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a case of improper privilege management that could permit an unprivileged local user to disclose sensitive files and execute arbitrary commands as root on default installations of several major

  • Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

    Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

    Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company’s Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world.

    The tech giant attributed the activity to a threat actor it calls Fox Tempest, which it said offered the MSaaS scheme

  • Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

    Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

    Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications.

    Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies

  • Agent AI is Coming. Are You Ready?

    Agent AI is Coming. Are You Ready?

    New Industry Data Just Released Suggests Not.

    On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026. Among the findings, “identity dark matter” (the unseen, unmanaged elements of identity) now overshadows the visible elements 57% vs. 43%. And it couldn’t have occurred at a worse time, with enterprises embracing Agent AI with both arms (and unfortunately, as

  • GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos

    GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos

    GitHub on Tuesday said it’s investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform’s source code and internal organizations for sale on a cybercrime forum.

    “While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises,

  • Typosquatting Is No Longer a User Problem. It’s a Supply Chain Problem

    Typosquatting Is No Longer a User Problem. It’s a Supply Chain Problem

    AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here’s why your current stack can’t see them, and what detection actually requires.
    Download the CISO Expert Guide to Typosquatting in the AI Era →

    TL;DR 

    Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate third-party scripts.