Skip to content
Threat Digest
Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats
Security Tools Compliance & Policy Cloud Security Threat Intelligence
🛡️

Security Tools

Urgent warning graphic for F5 BIG-IP CVE-2025-53521 vulnerability
Security Tools

F5 BIG-IP RCE Bug Sparks Patch Panic

UK's NCSC just sounded the alarm on F5 BIG-IP's CVE-2025-53521. Active exploits mean remote code execution; patching isn't optional.

3 min read 4 days, 9 hours ago
iPhone displaying iOS 18.7.7 security update notification warning of DarkSword threat
Security Tools

Apple's Rare Lifeline to Old iPhones: Dodging DarkSword's Web Traps

Apple just threw a curveball — patching iOS 18 on devices everyone thought were abandoned. It's all about DarkSword, a nasty exploit kit that's been lurking since last summer.

3 min read 4 days, 9 hours ago
Hacker injecting malware into Axios npm package code with North Korean flag overlay
Security Tools

North Korea Poisons Axios NPM with RATs in Bold Supply Chain Hit

A single hijacked maintainer turned Axios—the JS HTTP king with 100 million weekly downloads—into a RAT delivery vehicle. North Korean actors bet big on supply chain chaos, and it almost paid off.

4 min read 4 days, 9 hours ago
Chart of residential proxy evasion rates in 4 billion malicious internet sessions
Security Tools

Residential Proxies Ghost Past IP Defenses in 78% of 4 Billion Attacks

Four billion malicious sessions. 78% slip through IP reputation nets via sneaky residential proxies. Defenses built on bad assumptions are crumbling.

3 min read 4 days, 9 hours ago
Timeline graphic showing Iranian cyber evolution from Shamoon wipers to identity-based wipes
Security Tools

Iran's Hackers Swap Wipers for Identity Strikes

Forget the old disk-wipers; Iran's cyber crews are now hijacking your own admin tools to nuke devices. This sneaky pivot changes everything for global targets.

3 min read 4 days, 9 hours ago
Digital map showing cyber attacks from Iran-linked actors amid Middle East conflict
Security Tools

Iran's 27-Day Blackout Fuels Global Phishing Frenzy and Wiper Warnings

Screens flicker in boardrooms worldwide as Iranian-themed phishing lures flood inboxes. Unit 42's latest brief reveals a cyber storm brewing beyond the blackout.

4 min read 4 days, 9 hours ago
iPhone displaying iOS 18.7.7 security update notification blocking DarkSword exploit
Security Tools

Apple's Late DarkSword Patch Hits More iPhones – Too Little, Too Late?

If you've clung to your iPhone 11 or older on iOS 18, Apple's finally pushing DarkSword patches your way. Problem is, the exploit's already loose in the wild.

3 min read 4 days, 9 hours ago
Hacker remotely accessing microphone on wireless headphones via WhisperPair exploit
Security Tools

WhisperPair Exposes Google Fast Pair Headphones to Eavesdroppers Everywhere

Your wireless earbuds just became a spy's best friend. Belgian researchers' WhisperPair exploit turns Google Fast Pair into a backdoor for eavesdropping and stalking.

4 min read 4 days, 9 hours ago
Digital lock icon with Iranian flag overlay and ransomware demand screen
Security Tools

Iran's Hackers Dust Off Pay2Key: Fake Ransomware, Real Chaos

Picture this: your network locks up, demands crypto, but it's not some script kiddie—it's Tehran calling. Iran's APTs are back with pseudo-ransomware, reviving the Pay2Key nightmare.

4 min read 4 days, 9 hours ago
Android smartphone screen showing Advanced Protection mode enabled with security shields
Security Tools

Google's Android 16 Drops a Digital Fortress for Journalists and Politicians Under Siege

Over the last decade, even fully patched Android and iOS phones have fallen to mercenary hackers peddling zero-day exploits. Google's flipping the script with Advanced Protection mode in Android 16—a one-tap shield for those who can't afford to lose.

4 min read 4 days, 9 hours ago
RSAC 2026 keynote panel discussing AI threats and geopolitical cybersecurity risks
Security Tools

RSAC 2026 Exposes AI's Dark Side in a Fractured Geopolitical World

Picture this: AI supercharges nation-state hackers, turning code into weapons faster than defenders can patch. RSAC 2026 just mapped the battlefield.

4 min read 4 days, 9 hours ago
NoVoice Android malware icon on a compromised smartphone screen with Google Play Store background
Security Tools

NoVoice Malware's Rampage: 2.3 Million Android Phones Rooted via Google Play

What if the apps you downloaded from Google Play just handed root access to hackers? NoVoice malware did exactly that to 2.3 million Android users — and Google let it slide for months.

4 min read 4 days, 9 hours ago
← Newer Page 5 of 7 Older →
Threat Digest

Threat intelligence. Zero noise.

Categories

  • Data Breaches
  • Vulnerabilities & CVEs
  • Ransomware & Malware
  • Nation-State Threats
  • Security Tools
  • Compliance & Policy
  • Cloud Security
  • Threat Intelligence

More

  • RSS Feed
  • Sitemap
  • About
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi

© 2026 Threat Digest. All rights reserved.

📬

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.

No spam. Unsubscribe any time.

You clearly love Cybersecurity news — get it in your inbox

🏠 Home 🔍 Search 🔖 Saved 📂 Categories