Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#supply-chain-attack

Illustration of a person playing a video game with digital threat overlays.
Nation-State Threats

North Korean Hackers Trojanize Chinese Gaming Site [New Backdoor]

North Korea's ScarCruft APT has infiltrated a niche gaming platform serving ethnic Koreans in China, embedding a novel backdoor into its software. The operation, running since late 2024, targets users of traditional card and board games hosted on sqgame[.]net.

4 min read 2 weeks, 4 days ago
A stylized graphic representing a digital network with data flowing, overlaid with a lock icon that is partially broken, symbolizing a data breach.
Data Breaches

Vimeo Data Breach: 119K Exposed by ShinyHunters

Vimeo users' personal data has been compromised, exposing over 119,000 individuals to potential risks. The ShinyHunters extortion gang is behind the latest data heist.

5 min read 2 weeks, 4 days ago
Graphic representing a smartphone displaying game icons, with a subtle, ominous overlay suggesting hidden malware.
Nation-State Threats

North Korea's BirdCall Malware Hits Android Via Games

Who knew your favorite mobile game could be a gateway to North Korean surveillance? ScarCruft's latest play uses a compromised game platform to deliver an Android variant of their notorious BirdCall malware.

5 min read 2 weeks, 4 days ago
Illustration of code running on a server with a lock icon indicating security.
Explainers

Gemini CLI & Cursor: Critical RCE Flaws Patched

Critical flaws in Google's Gemini CLI and the AI-powered Cursor IDE have been patched, closing doors to widespread code execution. The vulnerabilities, affecting CI/CD pipelines and developer workflows, carried severe risk.

5 min read 2 weeks, 6 days ago
Abstract digital network with glowing nodes and connecting lines, representing interconnectedness and cyber activity.
Nation-State Threats

AI Unleashed: The Week of Digital Empires and Devastating Hacks

The digital world is in overdrive this week, from nation-state hackers being nabbed to sophisticated scams sweeping social media. But the real shocker? A supply chain attack targeting developers.

5 min read 3 weeks, 1 day ago
A stylized graphic representing a lock with a keyhole being digitally breached, symbolizing the LiteLLM vulnerability.
Explainers

LiteLLM SQLi Flaw: Hackers Strike API Keys

The world of AI development just got a bit scarier. A critical vulnerability in LiteLLM, the popular LLM gateway, has been weaponized by hackers, and they're going straight for the jugular – your API keys.

6 min read 3 weeks, 4 days ago
Illustration of a computer screen with code and a sleeping worm icon
Ransomware & Malware

GlassWorm's New Trick: OpenVSX Extensions Now 'Sleep' Before Attacking

The cybersecurity world braced for another supply chain assault, but GlassWorm's latest move in the OpenVSX ecosystem is a quiet, insidious evolution. They're no longer just dropping malware; they're planting seeds.

6 min read 3 weeks, 4 days ago
Malicious Docker Hub repository with Checkmarx KICS images compromised by hackers
Data Breaches

[2026] Checkmarx KICS Supply-Chain Hack Steals Secrets in 84 Minutes

In a blistering 84-minute window on April 22, 2026, attackers turned Checkmarx's KICS tool against its users, siphoning secrets from Docker pulls and VSCode extensions. This isn't just another breach—it's a blueprint for how supply-chain attacks are evolving.

5 min read 4 weeks, 1 day ago
Malicious Bitwarden CLI npm package code stealing developer credentials in supply chain attack
Data Breaches

[2026] Bitwarden CLI npm Compromised in Supply Chain Attack

Two hours. That's all it took for attackers to slip malicious code into Bitwarden's CLI npm package, turning a trusted password tool against developers. Credentials flew out—npm tokens, SSH keys, cloud secrets—and self-propagated to other projects.

5 min read 4 weeks, 1 day ago
Malicious CPU-Z download warning on compromised CPUID website with STX RAT alert
Ransomware & Malware

150+ Victims Hit in CPUID Breach [STX RAT Trojan]

Imagine downloading your trusty CPU-Z to check your rig's specs—only to hand attackers your entire desktop. That's what hit over 150 users when CPUID's site got pwned, serving STX RAT malware in trojanized installers.

5 min read 1 month, 1 week ago
North Korean hackers deploying malicious packages across npm PyPI Go Rust ecosystems
Nation-State Threats

North Korean Hackers Slip 1,700 Poison Pills into npm, PyPI, and Beyond

Imagine installing a logging library for your side project. Boom—North Korean spies snag your passwords and crypto. That's the nightmare unfolding right now.

4 min read 1 month, 1 week ago
Compromised CPUID download page redirecting to malicious HWiNFO installer
Ransomware & Malware

CPUID's Trusted Tools Turn Toxic: Hackers Poison CPU-Z and HWMonitor Downloads

A quick download for CPU specs just infected thousands with sophisticated malware. CPUID's API breach shows how even trusted diagnostics become hacker bait.

4 min read 1 month, 1 week ago
← Newer Page 3 of 4 Older →

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details