Intelligence Feed

Curated cybersecurity reporting and advisories. Headlines link to original sources.

Items
143
Last update
Apr 1, 2026, 09:21 AM (UTC)
Showing
0 results
SecurityWeek Apr 1, 2026, 08:45 AM (UTC)
Read

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions. The post Axios NPM Package Breached in North Korean Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek Mar 31, 2026, 02:51 PM (UTC)
Read

Venom Stealer Raises Stakes With Continuous Credential Harvesting

Licensed malware with built-in persistence and automation enables attackers to continuously siphon credentials, session data, and cryptocurrency assets. The post Venom Stealer Raises Stakes With Continuous Credential Harvesting appeared first on SecurityWeek.

BleepingComputer Mar 31, 2026, 02:00 PM (UTC)
Read

How to Categorize AI Agents and Prioritize Risk

AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first. [...]

SecurityWeek Mar 31, 2026, 01:53 PM (UTC)
Read

TeamPCP Moves From OSS to AWS Environments

After validating stolen credentials using TruffleHog, the hacking group started AWS services enumeration and lateral movement activities. The post TeamPCP Moves From OSS to AWS Environments appeared first on SecurityWeek.

SecurityWeek Mar 31, 2026, 01:37 PM (UTC)
Read

CrewAI Vulnerabilities Expose Devices to Hacking

Attackers can exploit the bugs through prompt injection, chaining them together to escape the sandbox and execute arbitrary code. The post CrewAI Vulnerabilities Expose Devices to Hacking appeared first on SecurityWeek.

Cybersecurity Ventures Mar 31, 2026, 12:19 PM (UTC)
Read

The CISO Gap: Why Every Business Needs Cybersecurity Leadership

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 31, 2026 – Read the full story in Forbes One message has persisted over the past few years: cybersecurity is no longer an IT concern; it has become a fundamental busine…

Cybersecurity Ventures Mar 30, 2026, 03:35 PM (UTC)
Read

AI SOC: Definition, Components & Architecture

AI-Driven Security and SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 30, 2026 Mid-market organizations face sophisticated cyber threats with constrained security budgets and lea…

The Hacker News Mar 30, 2026, 01:00 PM (UTC)
Read

3 SOC Process Fixes That Unlock Tier 1 Productivity

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early in the investigation. Fix…

The Hacker News Mar 30, 2026, 11:30 AM (UTC)
Read

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 a…

Cybersecurity Ventures Mar 27, 2026, 05:32 PM (UTC)
Read

Who’s Who In Domain Security: 10 Companies To Watch In 2026

Resource guide for CISOs and MSSPs – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Mar. 27, 2026 Domain security unexpectedly and repeatedly came up in Cybercrime Magazine’s discussions with chief information security officers (CISOs) and managed security…

The Hacker News Mar 27, 2026, 11:00 AM (UTC)
Read

We Are At War

Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized. Let’s admit it: we are in the middle of it. Introduction: One tech power to rule them all is a thing of the past The rel…

The Hacker News Mar 27, 2026, 10:04 AM (UTC)
Read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed Gen…

Cybersecurity Ventures Mar 26, 2026, 12:42 PM (UTC)
Read

Who’s Who In Domain Security: CISOs And MSSPs at RSAC 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 26, 2026 The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos was released on the first day of the RSAC Conference in San Francisco earlier this…

The Hacker News Mar 25, 2026, 11:58 AM (UTC)
Read

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance,…

Cybersecurity Ventures Mar 24, 2026, 12:58 PM (UTC)
Read

The Global CISO Landscape: A Leadership Gap Too Large To Ignore

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 24, 2026 – Read the full story from Sophos The 2026 CISO Report, published by Cybersecurity Ventures in partnership with Sophos, highlights a critical imbalance in glob…

The Hacker News Mar 24, 2026, 10:38 AM (UTC)
Read

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by…

Krebs on Security Mar 23, 2026, 03:43 PM (UTC)
Read

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the…

Cybersecurity Ventures Mar 23, 2026, 03:37 PM (UTC)
Read

Autonomous SOC: What It Is, Key Benefits and Core Challenges

Six Predictions for the AI-Driven SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 23, 2026 SOC Key Takeaways: What is Autonomous SOC solving? It addresses critical challenges in s…

Cybersecurity Ventures Mar 23, 2026, 12:42 PM (UTC)
Read

35,000 Chief Information Security Officers Employed Globally in 2026

2026 CISO Report from Cybersecurity Ventures in partnership with Sophos Sausalito, Calif. – Mar. 23, 2026 – Read the Full Report MSPs and MSSPs, the force multiplier in security leadership, are positioned to provide SMBs with CISO services. The world’s small t…

Cybersecurity Ventures Mar 20, 2026, 01:14 PM (UTC)
Read

Cybersecurity Ventures Will See You At RSAC Conference 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 20, 2026 If you’re making the pilgrimage to RSAC 2026 in San Francisco next week, then we might see you there. For the past five years, Cybersecurity Ventures has been…

Krebs on Security Mar 20, 2026, 12:49 AM (UTC)
Read

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web camera…

Page 1 of 1 0 results