How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
Security teams today are not short on tools or data. They are…
LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
The ransomware operation known as LeakNet has adopted the ClickFix social engineering…
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive…
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Ravie LakshmananMar 17, 2026Vulnerability / Network Security The U.S. Cybersecurity and Infrastructure…
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Ravie LakshmananMar 16, 2026Malware / Cryptocurrency The GlassWorm malware campaign is being…
Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
Ravie LakshmananMar 16, 2026Cybersecurity / Hacking Some weeks in security feel normal.…
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a…
Investigating a New Click-Fix Variant
Disclaimer: This report has been prepared by the Threat Research Center to…
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
Ravie LakshmananMar 13, 2026Ransomware / Cybercrime INTERPOL on Friday announced the takedown…


