Blog

  • Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

    Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

    Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company’s Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world.

    The tech giant attributed the activity to a threat actor it calls Fox Tempest, which it said offered the MSaaS scheme

  • Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

    Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

    Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications.

    Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies

  • Agent AI is Coming. Are You Ready?

    Agent AI is Coming. Are You Ready?

    New Industry Data Just Released Suggests Not.

    On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026. Among the findings, “identity dark matter” (the unseen, unmanaged elements of identity) now overshadows the visible elements 57% vs. 43%. And it couldn’t have occurred at a worse time, with enterprises embracing Agent AI with both arms (and unfortunately, as

  • GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos

    GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos

    GitHub on Tuesday said it’s investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform’s source code and internal organizations for sale on a cybercrime forum.

    “While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises,

  • Typosquatting Is No Longer a User Problem. It’s a Supply Chain Problem

    Typosquatting Is No Longer a User Problem. It’s a Supply Chain Problem

    AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here’s why your current stack can’t see them, and what detection actually requires.
    Download the CISO Expert Guide to Typosquatting in the AI Era →

    TL;DR 

    Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate third-party scripts.

  • DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability

    DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability

    Proof-of-concept (PoC) exploit code has now been released for a recently patched security flaw in the Linux kernel that could allow for local privilege escalation (LPE).
    Dubbed DirtyDecrypt (aka DirtyCBC), the vulnerability was discovered and reported by the Zellic and V12 security team on May 9, 2026, only to be informed by the maintainers that it was a duplicate of a vulnerability that had

  • The New Phishing Click: How OAuth Consent Bypasses MFA

    The New Phishing Click: How OAuth Consent Bypasses MFA

    In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five countries. 

    The targets of the platform received a message asking them to enter a short code at microsoft.com/devicelogin and complete their normal MFA challenge, then walked away believing they had verified a

  • Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

    Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

    Drupal has issued an alert stating that it intends to release a “core security release” for all supported branches on May 20, 2026, from 5-9 p.m. UTC.

    “The Drupal Security Team urges you to reserve time for core updates at that time because exploits might be developed within hours or days,” the maintainers of the PHP-based content management system (CMS) said.

    “Not all configurations are

  • SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

    SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

    Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that could be exploited to achieve remote code execution and enable an attacker to read arbitrary mails from the virtual appliance.
    “These vulnerabilities could have been exploited to read all mail traffic or as an entry vector into the internal network,”

  • Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

    Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

    Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio Code (VS Code) Marketplace.

    The extension in question is rwl.angular-console (version 18.95.0), a popular user interface and plugin for code editors like VS Code, Cursor, and JetBrains. The VS Code extension has more than 2.2 million installations. The Open