Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools
Compliance & Policy Cloud Security Threat Intelligence
AI Tools
📋

Compliance & Policy

WhatsApp icon cracked by VBS script code bypassing Windows UAC prompt
Compliance & Policy

WhatsApp's VBS Malware Sneaks Past UAC, Microsoft Says – And We're Not Impressed

Two billion WhatsApp users. One bad link. Microsoft's latest alert: VBS malware via chat that's dodging UAC like a pro.

3 min read 4 hours ago
Leaked Gmail interface from Kash Patel's account posted by Iranian hacker group Handala
Compliance & Policy

Iranian Hackers Nab FBI Director's Old Gmail—FBI Systems Hold Firm

Iranian hackers Handala just dumped years of FBI Director Kash Patel's personal emails. But the FBI's walls? Still standing tall—exposing the gap between bluster and breach.

4 min read 5 hours ago
Visualization of TeamPCP supply chain attack flow from LiteLLM to cloud breaches
Compliance & Policy

Mercor Breach Exposes TeamPCP's LiteLLM Rampage in Real Time

Mercor just admitted it: TeamPCP's LiteLLM poison pill hit hard. Wiz peels back the post-breach playbook, showing how attackers feast on cloud creds.

4 min read 5 hours ago
Malicious Axios npm package details with RAT indicators on screen
Compliance & Policy

Axios npm Poisoning: Hackers Hijack Your Dev Secrets via 100M Downloads

One npm install, and boom—your cloud keys are en route to a hacker's server. Axios, the unsung hero of JS networking, just got turned into a trojan horse.

3 min read 5 hours ago
Mercor AI recruiting platform interface with red breach alert overlay and LiteLLM logo
Compliance & Policy

Mercor's 4TB Nightmare: LiteLLM's Supply Chain Poison Reaches AI Hiring Giant

LiteLLM lurks in 36% of cloud environments — and now it's bitten Mercor hard. Extortionists boast 4TB of pilfered data, from video interviews to VPN creds.

3 min read 5 hours ago
Intrusion chain diagram showing AppleChris deployment and C2 communication in CL-STA-1087 attack
Compliance & Policy

China's Silent Siege on Southeast Asia's Militaries

Ghostly hackers from China have burrowed into Southeast Asian military networks for years. Patient, precise, and packing custom tools—they're not smashing and grabbing; they're mapping the future battlefield.

3 min read 5 hours ago
DeepLoad malware code visualization showing AI-generated junk layers hiding credential-stealing payload
Compliance & Policy

DeepLoad: AI's Junk Code Arsenal Redefines Malware Stealth

Forget the hype around AI building apps. DeepLoad malware flips the script, weaponizing generative models to bury its theft in mountains of nonsense code. Security teams are scrambling.

4 min read 5 hours ago
Hacker silhouette with Minecraft and botnet icons overlay, representing Dort
Compliance & Policy

Dort: The Minecraft Cheat Kid Running Kimwolf's Mayhem

Dort's not some shadowy genius. He's a traceable Ottawa teen whose botnet empire started with game cheats and spiraled into real-world threats.

4 min read 5 hours ago
EvilTokens phishing dashboard showing live Microsoft device code proxy and session hijack
Compliance & Policy

EvilTokens: Phishing's Drag-and-Drop Nightmare for Microsoft Logins

EvilTokens just landed, and it's arming script kiddies with pro-level phishing tools for Microsoft accounts. Business email compromise? Now easier than ever.

4 min read 5 hours ago
Digital illustration of ghostly signals bypassing Wi-Fi router encryption barriers
Compliance & Policy

AirSnitch: Wi-Fi's Encryption Shield Cracked from the Inside

You thought WPA3 made your Wi-Fi bulletproof against snoops on the same network. AirSnitch proves otherwise, turning your router into a leaky sieve for device chatter.

3 min read 5 hours ago
Timeline of Akira ransomware's sub-one-hour attack lifecycle
Compliance & Policy

Akira Ransomware: Full Attack in Under 60 Minutes

Ransomware just hit warp speed. Akira's crew wraps up the whole heist—access, exfil, encrypt—in less than 60 minutes, leaving victims scrambling.

3 min read 5 hours ago
ChatGPT interface with leaking data visualization and warning icons
Compliance & Policy

ChatGPT's One-Prompt Data Heist: Your Secrets Just Got Leaky

Imagine spilling your medical history to ChatGPT, only for a hidden prompt to beam it to some hacker's server. That's not sci-fi—it's what just happened, and it exposes how flimsy these AI guards really are.

3 min read 6 hours ago
Page 1 of 2 Older →
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • AI Tools
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.