Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#supply-chain-attack

Abstract digital art representing code and network connections, with a red warning overlay.
Ransomware & Malware

npm Packages Pack Infostealers & DDoS Bots [Alert]

The open-source code for malware is becoming a dangerous playground for attackers. Researchers just found four new npm packages peddling everything from data-stealing worms to potent DDoS bots.

5 min read 5 days, 11 hours ago
🔓
Data Breaches

Teams Recording Catches Cybercrime Twins [Analysis]

A catastrophic lapse in cybersecurity hygiene — a forgotten Microsoft Teams recording — has landed two brothers in hot water. Their vengeful digital rampage was inadvertently documented, painting a clear picture for prosecutors.

6 min read 1 week ago
Abstract depiction of computer code with a lock icon overlayed.
Vulnerabilities & CVEs

node-ipc Compromised: Your Secrets Are Now Dinner

The npm ecosystem just took another hit. The widely used node-ipc package has been compromised, actively stealing sensitive developer credentials.

4 min read 1 week, 1 day ago
Illustration of a code editor with a malicious gem file highlighted.
Threat Intelligence

RubyGems Now Data Dead Drops? Attackers Get Creative

The open-source world just got a little murkier. Attackers are now weaponizing RubyGems, turning widely used code repositories into elaborate data dead drops.

5 min read 1 week, 2 days ago
🕳️
Vulnerabilities & CVEs

RubyGems Suspends Registrations After Malicious Package Flood

A wave of malicious packages has forced RubyGems.org, the central repository for Ruby libraries, to shut down new account registrations. This move highlights ongoing supply chain vulnerabilities that threaten developer workflows.

5 min read 1 week, 3 days ago
Screenshot of a server room with glowing red lights indicating a security breach.
Vulnerabilities & CVEs

Checkmarx Jenkins Plugin Hijacked [Infostealer Attack]

Just when you thought CI/CD pipelines were safe, Checkmarx’s Jenkins plugin gets roped into a supply-chain attack. TeamPCP strikes again.

5 min read 1 week, 4 days ago
Abstract representation of code flowing through a compromised network, with a padlock symbol indicating a security breach.
Vulnerabilities & CVEs

TeamPCP Hits Checkmarx Again: The Supply Chain Trust Game

Just weeks after a supply chain attack that snaked through Bitwarden, TeamPCP is back, this time hijacking Checkmarx's own Jenkins plugin. It’s deja vu, and not the fun kind.

5 min read 1 week, 5 days ago
🦠
Ransomware & Malware

RansomHouse Claims Trellix Hack: Source Code Breach Raises Eyebrows

The cybersecurity world is reeling as RansomHouse, a known ransomware-as-a-service provider, claims a major breach of Trellix. The target: source code repositories.

5 min read 1 week, 6 days ago
Screenshot of a website showing a download button with a warning symbol
Data Breaches

JDownloader Hacked: Python RATs Lurked in Installers [2026 Attack]

Did you download JDownloader in early May 2026? You might have installed more than just a download manager. The popular tool's website was hijacked, pushing malware straight from the source.

4 min read 2 weeks ago
🌐
Nation-State Threats

North Korea Hacks Games [Espionage]

North Korea's ScarCruft APT has launched a sophisticated supply-chain attack, compromising a popular gaming platform to spy on ethnic Koreans in China. This isn't just about stolen accounts; it's a digital Trojan horse.

7 min read 2 weeks, 3 days ago
Illustration of a shadowy figure in a hooded sweatshirt typing on a laptop with lines of code in the background.
Ransomware & Malware

Quasar Linux Malware: Devs Under Siege

Linux developers, watch your backs. A new stealthy malware, dubbed Quasar Linux (QLNX), is slithering into development environments. This isn't your grandpa's virus; it's a sophisticated implant designed for long-term infiltration and credential theft.

6 min read 2 weeks, 3 days ago
A diagram illustrating a digital supply chain with a broken link, representing a security compromise.
Ransomware & Malware

DAEMON Tools Attack: Your Software Just Got Scarier

Imagine your trusted digital toolkit suddenly becoming a Trojan horse. That's precisely the terrifying reality for thousands using DAEMON Tools, thanks to a sophisticated supply chain attack.

5 min read 2 weeks, 4 days ago
← Newer Page 2 of 4 Older →

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details