Author: VanshTheHacker

  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos.
    “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity,” researchers Nick

  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager.
    The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.

  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    npm’s Update to Harden Their Supply Chain, and Points to Consider

    In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community.
    Let’s start with the original

  • Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks.
    “The

  • Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.
    The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

  • ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

    ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

    Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight.
    Another shift is how access is gained versus how it’s used. Initial entry points are getting simpler, while post-compromise

  • The CTEM Divide: Why 84% of Security Programs Are Falling Behind

    The CTEM Divide: Why 84% of Security Programs Are Falling Behind

    A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point

  • 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO.
    Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and 9, 2026. An estimated 346

  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks.
    The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation of the vulnerability could allow an

  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild.
    In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been