Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#credential-theft

Conceptual image of digital interconnected lines representing an attack path through various network nodes.
Security Tools

Identity is the New Attack Path [Security Blind Spot]

Forget firewalls. Your company's digital identity is the hottest target. And current security tools are missing the forest for the trees, enabling attackers to walk right through.

6 min read 2 days, 11 hours ago
Abstract digital network with interconnected nodes, some glowing red to indicate compromise.
Vulnerabilities & CVEs

Mini Shai-Hulud: Your Code is Now a Highway for Hackers

The digital equivalent of finding a Trojan horse in your code library just got a lot scarier. The Mini Shai-Hulud campaign is here, and it's not just about hitting tech giants; it's about every developer and every organization that relies on open-source software.

6 min read 4 days, 16 hours ago
Illustration of a computer screen with code and security icons, representing a developer workstation as a potential supply chain vulnerability.
Vulnerabilities & CVEs

Your Laptop Now Ships Software to Attackers

Forget just securing the code repository. A seismic shift is underway, transforming developer workstations into the hottest new target for sophisticated supply chain attacks.

6 min read 5 days, 11 hours ago
Abstract depiction of computer code with a lock icon overlayed.
Vulnerabilities & CVEs

node-ipc Compromised: Your Secrets Are Now Dinner

The npm ecosystem just took another hit. The widely used node-ipc package has been compromised, actively stealing sensitive developer credentials.

4 min read 1 week, 1 day ago
Screenshot of Avada Builder interface with security alert overlay
Vulnerabilities & CVEs

Avada Builder Flaws: 1 Million Sites at Risk of Credential Theft

A million WordPress sites using the popular Avada Builder plugin are exposed. Two severe vulnerabilities could hand over your site credentials to attackers.

5 min read 1 week, 1 day ago
Illustration of a truck being digitally intercepted by code.
Threat Intelligence

Freight Heists Go Digital

Forget movie-style truck hijackings. The new frontier of cargo crime is digital, employing the very same playbook as sophisticated ransomware gangs. Millions in goods are vanishing.

6 min read 1 week, 2 days ago
Illustration of a digital padlock with a broken chain, symbolizing a failed password reset.
Vulnerabilities & CVEs

Active Directory Leaks: Why Password Resets Fail

Think resetting a password nukes an Active Directory breach? Think again. Attackers are still finding ways in, and your quick fix might be giving them cover.

6 min read 1 week, 5 days ago
🎯
Threat Intelligence

Operation HookedWing: 500+ Orgs Breached in 4-Year Phishing Assault

A stealthy, multi-year phishing operation has compromised over 500 organizations. Operation HookedWing, documented since 2022 but active longer, continues to adapt and ensnare victims.

6 min read 1 week, 5 days ago
🎯
Threat Intelligence

Malware Hijacks: Cleaners Become Criminals

It’s an ironic twist: a new malware campaign is actively removing signs of rival hackers, only to replace them with its own malware and pilfer sensitive credentials from cloud environments.

6 min read 1 week, 6 days ago
A stylized image representing a digital network with a lock icon and caution symbols, illustrating cybersecurity threats.
Threat Intelligence

35,000 Users Hit: Mass Phishing Uses Fake Compliance Emails

Over 35,000 users and 13,000 organizations were ensnared in a sophisticated phishing campaign orchestrated by cunning attackers. This wasn't your grandpa's Nigerian prince scam; this was a masterclass in social engineering, disguised as routine internal communications.

6 min read 2 weeks, 4 days ago
An abstract representation of digital data streams flowing through a network, with a snowflake icon superimposed, symbolizing the 'Snow' malware.
Threat Intelligence

New 'Snow' Malware Hits Teams [Inside Job]

Forget phishing emails. The latest cyber threat actors are getting cozy, using Microsoft Teams and social engineering to trick their way deep inside corporate networks. This isn't just about malware; it's about a calculated, multi-stage infiltration.

5 min read 3 weeks, 6 days ago
Malicious Docker Hub repository with Checkmarx KICS images compromised by hackers
Data Breaches

[2026] Checkmarx KICS Supply-Chain Hack Steals Secrets in 84 Minutes

In a blistering 84-minute window on April 22, 2026, attackers turned Checkmarx's KICS tool against its users, siphoning secrets from Docker pulls and VSCode extensions. This isn't just another breach—it's a blueprint for how supply-chain attacks are evolving.

5 min read 4 weeks, 1 day ago
Page 1 of 2 Older →

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details