Fixed Intel
Shield

Malware & Threats

Malware analysis, threat intelligence, and emerging cyber threats

Backdoored PyTorch Lightning package drops credential stealer
BleepingComputer
Malware & Threats

Backdoored PyTorch Lightning package drops credential stealer

A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a credential-stealing payload targeting browsers, environment files, and cloud services.

BleepingComputer3d ago3m1
Trellix discloses data breach after source code repository hack
BleepingComputer
Malware & Threats

Trellix discloses data breach after source code repository hack

Cybersecurity firm Trellix disclosed a data breach after attackers gained access to "a portion" of its source code repository.

BleepingComputer3d ago2m1
They don’t hack, they borrow: How fraudsters target credit unions
BleepingComputer
Malware & Threats

They don’t hack, they borrow: How fraudsters target credit unions

Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan fraud methods use stolen identities to pass verification and secure funds.

BleepingComputer3d ago6m1
Progress warns of critical MOVEit Automation auth bypass flaw
BleepingComputer
Malware & Threats

Progress warns of critical MOVEit Automation auth bypass flaw

Progress Software warned customers to patch a critical authentication bypass vulnerability in its MOVEit Automation enterprise-grade managed file transfer (MFT) application.

BleepingComputer3d ago3m2
Webinar: Why MSPs must rethink security and backup strategies
BleepingComputer
Malware & Threats

Webinar: Why MSPs must rethink security and backup strategies

Security breaches don't just test your defenses—they test your recovery. Join Kaseya in our upcoming webinar to learn how MSPs strengthen resilience with SaaS backups and BCDR to stay operational after attacks.

BleepingComputer3d ago2m2
CISA says ‘Copy Fail’ flaw now exploited to root Linux systems
BleepingComputer
Malware & Threats

CISA says ‘Copy Fail’ flaw now exploited to root Linux systems

CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day after Theori researchers disclosed it and shared a proof-of-concept (PoC) exploit.

BleepingComputer3d ago3m2
Microsoft confirms April Windows updates cause backup failures
BleepingComputer
Malware & Threats

Microsoft confirms April Windows updates cause backup failures

Microsoft has confirmed that the April 2026 security updates are causing failures in third-party backup applications using the psmounterex.sys driver.

BleepingComputer3d ago3m2
Instructure confirms data breach, ShinyHunters claims attack
BleepingComputer
Malware & Threats

Instructure confirms data breach, ShinyHunters claims attack

Educational tech giant Instructure has confirmed that data was stolen in a cyberattack, with the ShinyHunters extortion gang claiming responsibility.

BleepingComputer4d ago3m1
Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha
BleepingComputer
Malware & Threats

Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha

Microsoft Defender is detecting legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, resulting in widespread false-positive alerts, and in some cases, removing certificates from Windows.

BleepingComputer4d ago5m1
Telegram Mini Apps abused for crypto scams, Android malware delivery
BleepingComputer
Malware & Threats

Telegram Mini Apps abused for crypto scams, Android malware delivery

Cybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known brands, and distribute Android malware.

BleepingComputer4d ago3m1
Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks
BleepingComputer
Malware & Threats

Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks

A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in "Sorry" ransomware attacks.

BleepingComputer5d ago3m3
ConsentFix v3 attacks target Azure with automated OAuth abuse
BleepingComputer
Malware & Threats

ConsentFix v3 attacks target Azure with automated OAuth abuse

A new attack type, dubbed ConsentFix v3, has been circulating on hacker forums, building on the previous technique by adding automation and scaling potential.

BleepingComputer5d ago4m1