Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
Cybersecurity researchers have discovered a new supply chain attack in which legitimate…
Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
Ravie LakshmananFeb 03, 2026Artificial Intelligence / Vulnerability Cybersecurity researchers have disclosed details…
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
A security audit of 2,857 skills on ClawHub has found 341 malicious…
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
AI agents are accelerating how work gets done. They schedule meetings, access…
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
As many as 3,136 individual IP addresses linked to likely targets of…
Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
Ravie LakshmananJan 19, 2026Hacking News / Cybersecurity In cybersecurity, the line between…
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusions
Ravie LakshmananJan 16, 2026Zero-Day / Cyber Espionage A threat actor likely aligned…
AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing…
GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
Jan 01, 2026Ravie LakshmananCybersecurity / Hacking News The first ThreatsDay Bulletin of…


