GlassWorm Spreads via 72 Malicious Open VSX Extensions Hidden in Transitive Dependencies

The GlassWorm malware campaign has evolved, significantly escalating its attacks on software developers. Instead of embedding malware directly into initial releases, the threat actors are now using transitive dependencies to sneak malicious code into developer environments. This stealthy approach allows…

Best 5 AI Pentesting Tools in 2026

Cyber threats are evolving at a pace that traditional security testing methods struggle to keep up with. Organizations today operate in highly complex digital environments with cloud platforms, APIs, microservices, and rapidly deployed applications. In such environments, manual security testing…

Global Authorities Take Down 45,000 Malicious IPs Used in Ransomware Campaigns

An unprecedented international law enforcement effort has successfully dismantled a massive cybercrime network. Coordinated by INTERPOL, the initiative targeted critical infrastructure used in phishing, malware, and ransomware campaigns worldwide. Operation Synergia III Dubbed “Operation Synergia III,” the global crackdown took…

IT Security News Daily Summary 2026-03-13

159 posts were published in the last hour 22:34 : Credential Stuffing in 2025 – How Combolists, Infostealers and Account Takeover Became an Industry 22:34 : IRONSCALES Winter ’26 Release: Preemptive Email Security 21:32 : Fortify Your Network Security from…