OpenAI is pulling the plug on its Sora video generation platform, a high-profile product launched to widespread attention last year that has since quietly faded from the spotlight. The shutdown is part of a broader strategic realignment as the company…
Tag: Cyber Security News
Firefox 149 Released With Patch for 37 Vulnerabilities that Enables Remote Attacks
Mozilla released Firefox 149 on March 24, 2026, delivering one of the largest security advisories in the browser’s recent history, addressing 37 vulnerabilities spanning memory corruption, sandbox escapes, use-after-free flaws, and remote code execution risks across multiple browser components. Published…
F5 NGINX Plus and Open Source Vulnerability Allow Attackers to Execute Code Using MP4 file
A high-severity vulnerability has been disclosed affecting both NGINX Open Source and NGINX Plus. Tracked formally as CVE-2026-32647, this security flaw carries a CVSS v4.0 base score of 8.5 and a CVSS v3.1 score of 7.8. It allows local, authenticated…
Five Malicious npm Packages Target Crypto Developers, Exfiltrate Wallet Keys via Telegram
The cryptocurrency development community is facing a serious supply chain threat after five malicious npm packages were discovered stealing private wallet keys and forwarding them directly to a Telegram bot. Published under the npm account “galedonovan,” these packages were crafted…
Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms
Aleksei Volkov, a 26-year-old Russian national, has been sentenced to 81 months in federal prison for operating as an Initial Access Broker (IAB). His illicit activities directly enabled major cybercrime syndicates, including the notorious Yanluowang ransomware group, to compromise numerous…
Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System
TP-Link has recently issued a critical security advisory addressing multiple high-severity vulnerabilities impacting its Archer NX series routers. These flaws, which affect the Archer NX200, NX210, NX500, and NX600 models, expose devices to severe risks. If exploited, threat actors could…
Hackers Exploiting Magento to Execute Remote Code and Gain Complete Account Access
A critical unrestricted file upload vulnerability, dubbed “PolyShell,” is actively being exploited in Magento and Adobe Commerce stores. Discovered by the Sansec Forensics Team, this flaw allows unauthenticated attackers to execute remote code (RCE) and completely take over accounts. With…
LiteLLM PyPI Package With 95 Million Downloads Compromised by TeamPCP Hackers
A widely used open-source Python library was compromised on the Python Package Index (PyPI). Versions 1.82.7 and 1.82.8 of the package, which route requests across various LLM providers and have over 95 million monthly downloads, were found to contain a…
FCC Banned Foreign-made Consumer Routers Over Security Risks
The Federal Communications Commission (FCC) announced a major update to its Covered List, officially prohibiting the approval of new consumer-grade network routers produced in foreign countries. This regulatory action prevents these new devices from entering the United States market by…
Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths
Passwordless authentication was supposed to mark the end of account takeovers. Designed to replace traditional passwords with cryptographic keys tied to physical devices, it promised a future where stolen credentials could no longer unlock user accounts. But a close examination…
ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill
Security research team has uncovered a critical vulnerability in ClawHub, the public skills registry for the OpenClaw agentic ecosystem. This flaw allowed attackers to artificially inflate the download counts of malicious skills, thereby bypassing security checks and manipulating search rankings.…
LiteLLM Python Package With 95 Million Downloads Compromised by TeamPCP Hackers
A widely used open-source Python library was compromised on the Python Package Index (PyPI). Versions 1.82.7 and 1.82.8 of the package, which route requests across various LLM providers and have over 95 million monthly downloads, were found to contain a…
Aqua Security’s Trivy Scanner Compromised in Supply Chain Attack
A sophisticated supply chain attack targeting Aqua Security’s widely used open-source vulnerability scanner, Trivy. A threat actor leveraged compromised credentials to distribute malicious releases, turning a trusted security tool into a mechanism for large-scale credential theft across CI/CD pipelines. The…
Kali Linux 2026.1 Released With 8 New Hacking Tools
Kali Linux 2026.1 has officially been released, marking the first major update of the year for the popular penetration testing distribution. Designed for professionals engaged in technical security research and vulnerability analysis, this update features modern aesthetic enhancements, notable advancements…
Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE Cloud Scanner
A persistent threat actor known as Larva-26002 has been continuously targeting poorly managed Microsoft SQL (MS-SQL) servers, this time deploying a new scanner malware called ICE Cloud Client. The campaign has been active since at least January 2024 and continues…
CanisterWorm Gets Destructive as TeamPCP Deploys Iran-Focused Kubernetes Wiper
A threat actor known as TeamPCP has taken a sharp turn toward destruction with a new payload that goes far beyond credential theft or backdoor installation. The group, tracked as a cloud-native attacker since late 2025, has deployed a Kubernetes…
Tycoon2FA Operators Resume Cloud Account Phishing After Infrastructure Disruption
Cybercriminals behind Tycoon2FA, a phishing-as-a-service (PhaaS) platform, have resumed targeting cloud accounts with near-full force despite a coordinated law enforcement takedown on March 4, 2026. Europol, working alongside authorities from six countries, seized 330 domains that formed the backbone of…
Dell Wyse Management Vulnerabilities Enables Complete System Compromise
A recent security analysis has revealed how chaining seemingly minor logic flaws in Dell Wyse Management Suite (WMS) On-Premises can result in a complete system compromise. Security researchers demonstrated that combining two distinct vulnerabilities allows an unauthenticated attacker to bypass…
HackerOne Data Breach – Employees Data Stolen Following Navia Hack
HackerOne recently disclosed a data breach affecting 287 of its employees following a cyberattack on its U.S. benefits administrator, Navia Benefit Solutions. The breach stemmed from a Broken Object Level Authorization (BOLA) vulnerability in Navia’s API, which exposed the sensitive…
Google Forms Job Lures Deliver PureHVNC in New Multi-Stage Malware Campaign
Attackers have found a new way to push malware by weaponizing one of the most trusted everyday tools — Google Forms. A newly identified campaign is exploiting business-themed lures, including fake job interviews, project briefs, and financial documents, to deliver…