Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools
Compliance & Policy Cloud Security Threat Intelligence
AI Tools
🔓

Data Breaches

Rogue AI agent breaching Google Cloud Vertex AI barriers to access private data vaults
Data Breaches

Vertex AI's Hidden Backdoor: How Default Permissions Betray Google Cloud Users

Imagine deploying an AI agent to streamline your ops—only for it to morph into a spy rifling through your cloud secrets. Vertex AI's default setup makes this nightmare real.

4 min read an hour ago
Depthfirst announces $80M Series B and Dfs-mini1 AI security model launch
Data Breaches

Depthfirst's $80M Sprint: Why AI Security Models Are Racing to Smart Contracts

Depthfirst just vacuumed up $80 million in Series B funding—totaling $120 million in under three months. Their new Dfs-mini1 model promises to lock down smart contracts with specialized AI.

4 min read 2 hours ago
Illustration of a rogue AI agent breaching a digital vault amid open-source code repositories
Data Breaches

Clawdbot's Meteoric Rise Exposes AI Agents' Hidden Security Perils

Clawdbot's overnight fame—85,000 GitHub stars in a week—highlights the double-edged sword of AI agents: massive productivity, massive risks. Here's why security can't be an afterthought.

3 min read 2 hours ago
Fake CAPTCHA page dropping Infiniti Stealer payload on macOS Terminal
Data Breaches

Infiniti Stealer: macOS's Sneaky New Thief via Fake CAPTCHA and Terminal Tricks

Imagine pasting a 'CAPTCHA fix' into Terminal, only to hand your Mac's keys to hackers. Infiniti Stealer is here, blending old-school tricks with cutting-edge compilation to plunder browsers, wallets, and Keychain.

3 min read 2 hours ago
CISO Frederick Lee discussing AI deployment in cybersecurity operations room
Data Breaches

CISOs Bet Big on AI Security Tools—But Who's Cashing In?

Forget the boardroom pitches—your IT team's drowning in alerts, and AI might finally lighten the load. But after 20 years watching Valley hype cycles, I'm asking: is this different, or just another vendor gold rush?

3 min read 2 hours ago
Digital illustration of an iPhone screen cracking open to reveal hidden malware code with US flag motifs
Data Breaches

Leaked US iPhone Hack Tool Turns Your Phone into a Spy in Seconds

Your next innocent website tap could doom your iPhone. A leaked US hacking toolkit called Coruna exploits 23 iOS flaws to slip in undetectable malware, blurring lines between spies and street criminals.

4 min read 2 hours ago
Microsoft Patch Tuesday March 2026 security updates fixing 77 vulnerabilities including AI-found flaws
Data Breaches

Microsoft's March 2026 Patch Tuesday Drops 77 Fixes — Including AI-Spotted Criticals — But Here's Why IT Can't Snooze

Billions of Windows users wake up to 77 fresh patches today. Skip them, and you're handing attackers the keys — especially with AI now spotting flaws humans miss.

3 min read 2 hours ago
Flowchart showing UI Access elevation bypassing UIPI in Windows UAC
Data Breaches

Five Ways UI Access Cracked Windows' Admin Protection — Before It Even Launched

Nine zero-days in a single feature. Researcher James Forshaw exposed how UI Access, meant for screen readers, became a backdoor to admin privileges — until Microsoft patched them all pre-launch.

4 min read 2 hours ago
Digital illustration of locked cloud icons cracking open with flying credential keys
Data Breaches

TeamPCP's Credential Blitz: AWS and Azure Fall in Hours, Not Days

Your cloud bill explodes overnight — crypto rigs humming on your dime. That's TeamPCP breaches in action, turning pilfered credentials into instant chaos for businesses everywhere.

4 min read 2 hours ago
Diagram of Starkiller phishing proxy relaying real login page traffic
Data Breaches

Starkiller: The Proxy That Turns Real Logins into Criminal Goldmines

What if the phishing page you're staring at is the real deal, proxied through a criminal server? Starkiller makes it happen, stealing credentials and MFA in real time.

3 min read 2 hours ago
Infographic showing hackers seizing Drift Protocol Security Council and draining $280M funds
Data Breaches

Drift Protocol's $280M Governance Hijack Exposes DeFi's Multisig Weak Spot

Solana's DeFi darling, Drift Protocol, just got gutted for $280 million. Hackers didn't touch code; they owned the multisig council instead.

3 min read 2 hours ago
Infographic of UK CNI firms facing multi-million pound OT cyber-attack downtime costs
Data Breaches

UK Power Grids and Factories on the Brink: £5M OT Downtime Nightmares Hit 80% of CNI Firms

Imagine your city's lights blinking out because hackers flipped a switch in a distant server. That's the stark reality for 80% of UK CNI firms staring down £5m OT downtime bills from cyber chaos.

3 min read 2 hours ago
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • AI Tools
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.