Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools
Compliance & Policy Cloud Security Threat Intelligence
AI Tools
🛡️

Security Tools

iPhone displaying urgent iOS security update notification with zero-day warnings
Security Tools

Apple's Zero-Day Double Whammy: iPhone Owners, Patch Up or Perish

Apple swore iPhones were the secure choice. Now two zero-days prove otherwise, with exploits already in the wild. Time to hit update, folks.

3 min read 3 hours ago
Cyber threat icons overlaying Android phone and server chains with red alert warnings
Security Tools

ShareFile Backdoors, Android Rootkits, and FBI Warnings: Inside This Week's ThreatsDay Bulletin

Attackers are chaining tiny flaws into massive backdoors, while Android rootkits burrow deep into millions of devices. This week's ThreatsDay Bulletin reveals the raw mechanics of modern threats—no hype, just the fixes you need now.

4 min read 3 hours ago
TrueConf video conferencing vulnerability exploited in Southeast Asian government network attacks
Security Tools

TrueConf's Poisoned Updates Infect Southeast Asian Gov Networks

Imagine your video call app turning into a hacker's playground. That's TrueConf's nightmare: a zero-day flaw letting attackers poison updates across government networks.

3 min read 3 hours ago
Phishing email with locked PDF attachment mimicking court summons for Casbaneiro trojan delivery
Security Tools

Casbaneiro Gang's Sneaky Dynamic PDFs Hit Enterprises in LatAm and Europe

Forget static phishing lures. Brazilian crooks are cranking out custom PDFs on the fly to slip Casbaneiro banking trojans past enterprise gates. It's not just consumers anymore.

4 min read 3 hours ago
Network diagram showing three threat clusters converging on Southeast Asian government endpoints with USB and RAT icons
Security Tools

Three China-Aligned Hack Clusters Pile Onto One Southeast Asian Government Network

A single USB drive lit the fuse, but three separate China-aligned crews kept the fire burning across a Southeast Asian government's network for months. This isn't random—it's a masterclass in divided ops.

4 min read 3 hours ago
CISA warning alert for Palo Alto Networks PAN-OS firewall vulnerability CVE-2022-0028
Security Tools

Palo Alto's Firewall Glitch Hits CISA's 'Fix Now' List After Real-World Attacks

CISA's Known Exploited Vulnerabilities catalog just grew by one: a Palo Alto firewall bug that's already drawing fire from attackers. Patch by September 9, or risk becoming the next DDoS reflector.

4 min read 3 hours ago
Cisco UCS rack servers with exposed IMC vulnerability warning overlay
Security Tools

Cisco's 9.8 Flaws Hand Attackers Server Keys and Root Access

Cisco dropped fixes for a pair of max-danger 9.8 CVSS holes — one lets attackers rewrite admin passwords remotely, the other cracks open root shells on SSM. No exploits yet, but history screams 'patch now.'

4 min read 3 hours ago
Close-up of MacBook notch with glowing green camera indicator light
Security Tools

Apple's Unhackable Camera Glow: The Hardware Trick Malware Can't Touch

That tiny green dot on your MacBook? It's not just a polite heads-up—it's a fortress gatekeeper. Apple's camera indicator lights rewrite the rules on device privacy, making surreptitious spying a nightmare for hackers.

4 min read 3 hours ago
Diagram showing malicious AI agent extracting credentials from GCP Vertex AI service account
Security Tools

GCP Vertex AI's Hidden Trap: How AI Agents Become Corporate Double Agents

You deploy an AI agent in GCP's Vertex AI thinking it's your trusty sidekick. Turns out, it might be spilling your secrets to attackers. Unit 42's research just blew the lid off this sneaky vulnerability.

4 min read 3 hours ago
Screenshot of phony Avast virus scan page claiming threats detected
Security Tools

Fake Avast Site Runs Bogus Scan, Drops Venom Stealer on Naive Users

You're one click away from handing over your passwords and crypto to thieves posing as Avast. This scam's old-school scare tactics meet modern stealer malware.

3 min read 3 hours ago
Linx Security logo with $50M funding announcement and AI identity network graphic
Security Tools

Linx Security's $50M Gamble on AI Identity Wrangling

Linx Security just pocketed $50 million to chase AI dreams in identity security. Skeptical? You're not alone—let's unpack the pitch.

4 min read 3 hours ago
Layered diagram of cognitive security stack with brain and IT parallels
Security Tools

Brain Hack Taxonomy: Five Layers Where Reality Crumbles

Picture your brain as a fortress riddled with unpatched exploits. K. Melton's taxonomy of cognitive security just redrew the battle lines between perception and manipulation.

4 min read 3 hours ago
← Newer Page 2 of 7 Older →
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • AI Tools
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.