Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#credential-theft

Malicious Bitwarden CLI npm package code stealing developer credentials in supply chain attack
Data Breaches

[2026] Bitwarden CLI npm Compromised in Supply Chain Attack

Two hours. That's all it took for attackers to slip malicious code into Bitwarden's CLI npm package, turning a trusted password tool against developers. Credentials flew out—npm tokens, SSH keys, cloud secrets—and self-propagated to other projects.

5 min read 4 weeks, 1 day ago
Storm infostealer control panel showing hijacked browser sessions and decrypted credentials
Ransomware & Malware

Storm Infostealer: Your Browser Sessions Are Now for Sale, Undetected

Imagine logging into your corporate email, only for a cybercrook halfway across the world to slip in behind you—using your own active session. Storm's doing exactly that, and it's dirt cheap.

5 min read 1 month, 1 week ago
Terminal window installing malicious LiteLLM package with credential paths exposed
Cloud Security

LiteLLM's Poisoned PyPI Packages Turned Dev Laptops Into Open Credential Safes

One pip install, and your AWS keys were gone. The LiteLLM attack shows developer laptops aren't just tools—they're attacker playgrounds loaded with plaintext secrets.

4 min read 1 month, 2 weeks ago
Digital illustration of a router with Russian bear claw marks redirecting data streams to spy servers
Nation-State Threats

APT28's Router Trap: How Russian Hackers Are Siphoning Your Secrets Through Everyday WiFi Gear

Imagine your trusty router, that unassuming box in the corner, quietly handing your login details to GRU spies. Russia's APT28 just turned SOHO devices into credential vacuums, and the UK's NCSC is sounding the alarm.

5 min read 1 month, 2 weeks ago
🎯
Threat Intelligence

Infostealers Nabbed 2.3 Billion Creds Last Year—Your Breach Alerts Missed Most

Shadowserver clocked 2.3 billion credentials swiped by infostealers in 2023 alone. Simple breach monitoring? It's blind to the real action.

5 min read 1 month, 2 weeks ago
Screenshot of Venom phishing email with QR code luring C-suite executives
Threat Intelligence

Venom PhaaS Powers Ruthless Credential Grabs from C-Suite Targets

Forget basic phishing. Venom's PhaaS targets CEOs with personalized SharePoint lures and MFA-busting tricks. It's not hype—it's hitting real boards now.

4 min read 1 month, 2 weeks ago
Visualization of DeepLoad malware's AI-obfuscated code hiding credential stealer payload
Threat Intelligence

DeepLoad Malware: AI-Powered ClickFix Scam That's Already Stealing Enterprise Logins

DeepLoad isn't your grandpa's virus—it's AI-boosted, credential-grabbing malware slipping past defenses via social engineering and code bloat. Enterprises, wake up: this one's persistent and evolving.

5 min read 1 month, 2 weeks ago
Dashboard of NEXUS Listener showing stolen credentials from breached Next.js hosts
Threat Intelligence

766 Next.js Servers Gutted by CVE-2025-55182: Hackers Snag Keys, Secrets, and Your Whole Damn Infra Map

Next.js promised smoothly full-stack bliss. Then CVE-2025-55182 let hackers raid 766 hosts, grabbing credentials and mapping entire infrastructures for the dark web auction.

5 min read 1 month, 2 weeks ago
Venom Stealer operator panel showing real-time data exfiltration and crypto cracking dashboard
Nation-State Threats

Venom Stealer: The Malware That Turns One-Time Heists into Endless Data Streams

Imagine malware that doesn't pack up and leave after grabbing your passwords. Venom Stealer sticks around, slurping data continuously—turning your machine into a perpetual leak.

4 min read 1 month, 2 weeks ago
DeepLoad malware code visualization showing AI-generated junk layers hiding credential-stealing payload
Compliance & Policy

DeepLoad: AI's Junk Code Arsenal Redefines Malware Stealth

Forget the hype around AI building apps. DeepLoad malware flips the script, weaponizing generative models to bury its theft in mountains of nonsense code. Security teams are scrambling.

5 min read 1 month, 2 weeks ago
Storm infostealer control panel displaying stolen browser credentials and crypto wallet data
Vulnerabilities & CVEs

Storm Infostealer: Hackers Now Decrypt Your Passwords on Their Servers

Your next browser login could hand hackers remote control—without them ever cracking it on your PC. Storm infostealer just upped the ante on credential theft.

5 min read 1 month, 2 weeks ago
← Newer Page 2 of 2

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details