Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools
Compliance & Policy Cloud Security Threat Intelligence
AI Tools
🛡️

Security Tools

Phishing email example impersonating Palo Alto Networks talent acquisition team demanding resume fees
Security Tools

Scammers Hijack Palo Alto's Name to Extort Execs Over Fake Resume Fees

Ever wonder why that dream job email from 'Palo Alto talent acquisition' feels off? Scammers are scraping LinkedIn to hit senior pros with personalized phishing, charging bogus fees to 'fix' your resume.

4 min read 7 hours ago
Diagram of Axios npm compromise injecting plain-crypto-js RAT across Windows, macOS, and Linux
Security Tools

Inside the Axios Hijack: How DPRK RATs Slipped into Dev Workflows Worldwide

Your next npm install could drop a North Korean RAT on your machine. That's the brutal reality for devs worldwide after the Axios supply chain attack—and it's already hit finance, tech, and healthcare.

4 min read 7 hours ago
Hasbro headquarters with digital breach warning overlay and locked systems icon
Security Tools

Hasbro's Breach: Weeks of Chaos Ahead

Hasbro's not playing games anymore. A cyber attack has them pulling systems offline, with fixes dragging on for weeks.

4 min read 7 hours ago
Darkened computer screens in a Latin American government control room amid cyberattack chaos
Security Tools

Latin America's Digital Frontlines: Governments Bracing for Cyber Onslaught

Hackers aren't knocking politely anymore—they're kicking down the doors of Latin American government systems. Puerto Rico's outages and Colombia's health sector probes signal a brutal new phase.

3 min read 7 hours ago
Network diagram showing IoT devices like routers and cameras forming botnets launching DDoS floods at servers
Security Tools

Feds Smash Four IoT Botnets That Powered DDoS Attacks Big Enough to Black Out the DoD

Your router might be a cyber weapon. Feds just crippled four IoT botnets behind record DDoS attacks—but the real fight is in why these things keep rising from the grave.

4 min read 7 hours ago
American flag overlay on consumer WiFi router with red ban stamp and supply chain icons
Security Tools

US Router Ban: Foreign Gear Out, Prices Up, Security Gamble In

Your next router might cost double — all thanks to a sweeping US ban on foreign-made gear. Security wins? Or just a win for domestic players like Elon Musk?

4 min read 7 hours ago
Digital illustration of cloud servers spawning virtual Android phones mimicking real devices for bank account theft
Security Tools

Cloud Phones Let Crooks Rent Victim Mimics for Pennies, Dodging Bank Defenses

Banks bet big on device fingerprinting to stop account takeovers. Crooks just rented cloud phones that mimic everything perfectly—for pocket change.

4 min read 7 hours ago
Pixel 9 phone displaying incoming audio message with red vulnerability warning overlay
Security Tools

Pixel 9's Silent Killer: 0-Click Exploits via Obscure Audio Codecs

A Pixel 9 sits untouched, yet attackers slip in through audio messages. Google's overlooked codecs turn innocent buzzes into full compromises.

3 min read 7 hours ago
Cracked digital vault spilling crime tip data and personal records into hacker shadows
Security Tools

Millions of Crime Tips Leaked: The Hack That Shatters Anonymous Reporting

Picture this: your secret tip to bust a local dealer, now splashed across hacker forums with your phone number attached. That's the nightmare unfolding from a massive breach at Crime Stoppers' backend provider.

4 min read 7 hours ago
Cyber extortion gang Scattered Lapsus ShinyHunters harassing executives with threats and swatting
Security Tools

Scattered Lapsus ShinyHunters: Paying Them Just Buys More Swats and Threats

Picture this: You pay the ransom, data's supposedly deleted, but the threats keep coming—now aimed at your kids. Scattered Lapsus ShinyHunters doesn't play by ransomware rules; they revel in the fallout.

3 min read 7 hours ago
Urgent warning graphic for F5 BIG-IP CVE-2025-53521 vulnerability
Security Tools

F5 BIG-IP RCE Bug Sparks Patch Panic

UK's NCSC just sounded the alarm on F5 BIG-IP's CVE-2025-53521. Active exploits mean remote code execution; patching isn't optional.

3 min read 7 hours ago
iPhone displaying iOS 18.7.7 security update notification warning of DarkSword threat
Security Tools

Apple's Rare Lifeline to Old iPhones: Dodging DarkSword's Web Traps

Apple just threw a curveball — patching iOS 18 on devices everyone thought were abandoned. It's all about DarkSword, a nasty exploit kit that's been lurking since last summer.

3 min read 7 hours ago
← Newer Page 4 of 7 Older →
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • AI Tools
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.