Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#supply-chain-attacks

SecurityScorecard logo with a stylized network graphic overlay
Threat Intelligence

SecurityScorecard Acquires Driftnet, Bolsters Third-Party Risk

SecurityScorecard just swallowed Driftnet, a move signaling an aggressive push to fortify defenses against the ever-growing threat of supply-chain attacks.

5 min read 1 week, 1 day ago
Illustration of a truck being digitally intercepted by code.
Threat Intelligence

Freight Heists Go Digital

Forget movie-style truck hijackings. The new frontier of cargo crime is digital, employing the very same playbook as sophisticated ransomware gangs. Millions in goods are vanishing.

6 min read 1 week, 2 days ago
A stylized digital brain with glowing connections representing AI, surrounded by abstract digital threats.
Threat Intelligence

AI Used for Exploits: What It Means for You

Attackers are now using AI to discover zero-day vulnerabilities and craft sophisticated malware. This isn't theoretical; it's happening now, and real people are in the crosshairs.

7 min read 1 week, 5 days ago
🎯
Threat Intelligence

Malware Hijacks: Cleaners Become Criminals

It’s an ironic twist: a new malware campaign is actively removing signs of rival hackers, only to replace them with its own malware and pilfer sensitive credentials from cloud environments.

6 min read 1 week, 6 days ago
Abstract representation of a tangled web of code, with red nodes indicating security breaches and interconnected lines showing propagation.
Vulnerabilities & CVEs

npm's 'Nuisance' Era is Over: The Rise of Wormable Attacks

The days of worrying about minor npm annoyances are long gone. A chilling new breed of self-replicating malware is reshaping the threat landscape, turning the developer's trusted toolkit into a weapon.

6 min read 4 weeks ago
Digital assembly line depicting hackers scaling social engineering attacks on NPM maintainers like the Axios incident
Vulnerabilities & CVEs

Axios NPM Hijack: When Social Engineering Goes Factory-Scale

We all figured Axios was untouchable, that rock-solid HTTP client millions rely on. But hackers didn't crack code—they conned humans, at industrial scale.

5 min read 1 month, 2 weeks ago
Weekly security roundup collage: fake job emails, npm code, Wikipedia bot icon, Apple patch alert
Threat Intelligence

Security's Wild Week: Fake Jobs, AI Chaos, and Supply Chain Scares

Everyone figured it'd be a quiet week post-patches. Instead, scams hijacked dream jobs, AI sparked bot wars, and supply chains took fresh hits—shifting how we guard credentials and code.

5 min read 1 month, 2 weeks ago
Infographic showing 0ktapus phishing flow from SMS to Okta credential theft across global firms
Ransomware & Malware

0ktapus Phishing Snags 10,000 Credentials Across 130 Companies—Your MFA Is the Weak Link

Your next SMS from 'IT support' could hand hackers your company's keys. 0ktapus just proved MFA is no silver bullet, snaring thousands in a slick Okta phishing blitz.

5 min read 1 month, 2 weeks ago
TeamPCP hackers exploiting PyPI packages for ransomware with Lapsus$ and Vect logos
Vulnerabilities & CVEs

TeamPCP's Stolen Secrets Pipeline: Fueling Ransomware Rampage

Your next PyPI download could hand hackers your cloud keys. TeamPCP's blending supply chain hacks with extortion gangs, turning dev tools into ransomware launchpads.

5 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details