Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools
Compliance & Policy Cloud Security Threat Intelligence
AI Tools
🦠

Ransomware & Malware

Infographic showing 0ktapus phishing flow from SMS to Okta credential theft across global firms
Ransomware & Malware

0ktapus Phishing Snags 10,000 Credentials Across 130 Companies—Your MFA Is the Weak Link

Your next SMS from 'IT support' could hand hackers your company's keys. 0ktapus just proved MFA is no silver bullet, snaring thousands in a slick Okta phishing blitz.

4 min read an hour ago
Code snippet showing Claude Code permission bypass via subcommand overflow
Ransomware & Malware

Claude Code's 50-Command Cap: The Bypass That Unlocks Your Dev Machine

Anthropic's Claude Code hit a double whammy: a source leak followed by a permission system flaw that skips deny rules entirely. Developers, your SSH keys might be next if you're not careful.

4 min read 2 hours ago
Attack chain diagram showing REF1695 ISO lure deploying CNB Bot and XMRig miner
Ransomware & Malware

REF1695's ISO Trick: $9K Crypto Haul from Fake Installers and RATs

Forget flashy ransomware. This crew's quietly mined 27.88 XMR — that's $9,392 — by tricking users with ISO lures since late 2023. But the real scam? RATs and fraud on top.

4 min read 2 hours ago
FBI and CISA public service announcement on Russian phishing attacks targeting Signal and WhatsApp accounts
Ransomware & Malware

FBI, CISA Blast: Russian Phishers Hijacking Signal and WhatsApp Accounts Worldwide

Signal and WhatsApp promised ironclad privacy. Turns out, Russian hackers don't need to crack encryption—they just steal your login. FBI and CISA are screaming warnings. Ignore at your peril.

3 min read 2 hours ago
Compromised fake Australian news site loading ScanBox JavaScript keylogger
Ransomware & Malware

Red Ladon Poisons Australian News Sites with ScanBox Keyloggers

Click that 'Sick Leave' email from Australian Morning News. Boom—your keystrokes are ScanBox's. China's Red Ladon just dusted off a 10-year-old trick for fresh espionage.

3 min read 2 hours ago
Digital worm icon spreading through cloud servers with Iranian flag overlay
Ransomware & Malware

CanisterWorm: Cybercrooks Hijack Iran Tensions for Cloud Data Heists

A worm called CanisterWorm just lit up Iranian cloud setups, wiping data based on time zones and language. Behind it? TeamPCP, who own 97% of their hits on Azure and AWS misconfigs.

3 min read 2 hours ago
Phishing email mimicking IRS tax form with malware link
Ransomware & Malware

100+ Tax Scams Flood Inboxes in Early 2026 – Criminals Get Sneakier

Proofpoint nailed more than 100 tax scams in early 2026. Criminals aren't just phishing – they're deploying malware, stealing creds, and posing as execs for W-2s.

3 min read 2 hours ago
Vibrant Latin American coders collaborating on cybersecurity defenses in a bustling tech hub
Ransomware & Malware

LatAm's Hidden Cyber Wizards: Self-Taught Talent Ready to Crush the Attack Wave

Picture this: your company's defenses crumbling under relentless cyberattacks, while a pool of battle-tested, self-taught cyber talent in LatAm goes begging. It's not hype—it's the next frontier for desperate security teams.

3 min read 2 hours ago
Microsoft Patch Tuesday February 2026 announcement with zero-day vulnerability icons and Windows logo
Ransomware & Malware

Microsoft's February 2026 Patch Tuesday Plugs Six Actively Exploited Zero-Days

Six zero-days. Fifty-plus flaws. Microsoft's February 2026 Patch Tuesday is a frantic scramble against hackers who've already broken in. Developers, your AI sidekicks just got a rude security wake-up.

3 min read 2 hours ago
Pixel 9 displaying Google Messages with incoming audio attachment and overlaid exploit code visualization
Ransomware & Malware

Pixel 9's Dolby Decoder: The 0-Click Path Project Zero Just Paved Wide Open

A single SMS audio file. Zero taps. Full code execution on Pixel 9. Project Zero didn't just find bugs—they chained them into a nightmare for Android's vaunted security.

3 min read 2 hours ago
CrowdStrike Charlotte AI AgentWorks interface showing security agents in action
Ransomware & Malware

27 Seconds to Breach: CrowdStrike's Charlotte AI Hype Check

Attacks land in 27 seconds flat. CrowdStrike's Charlotte AI says it'll arm security teams with AI agents that think faster than hackers. Yeah, right—let's see the receipts.

3 min read 2 hours ago
Illustration of VirtualBox Slirp heap corruption enabling VM to host userspace escape
Ransomware & Malware

VirtualBox's Dusty 2017 Heap Hack: Guests Storming the Host via Slirp Shenanigans

Folks figured VM NAT was bulletproof userspace sleight-of-hand. Wrong. This revived 2017 exploit blueprint shows guests corrupting heaps to hijack the host process.

4 min read 2 hours ago
Page 1 of 2 Older →
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • AI Tools
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.