Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#infostealer-malware

Abstract digital network graphic with red warning indicators
Ransomware & Malware

Hugging Face Hack: AI Supply Chain Danger Exposed

Everyone thought Hugging Face was a safe haven for AI innovation. Think again. A recent discovery of a sophisticated infostealer malware disguised as a legitimate OpenAI tool shatters that illusion and blows the AI supply chain lid wide open.

4 min read 1 week, 4 days ago
Screenshot of a Roblox account login page with a security alert overlay
Data Breaches

Roblox Hackers Stole 610K Accounts in $225K Scheme

Over 610,000 Roblox accounts were reportedly pilfered by a hacking group, netting them an estimated $225,000. Ukrainian authorities have arrested three suspects in connection with the operation.

5 min read 3 weeks, 1 day ago
Illustration of Chrome browser locking session credentials to a Windows TPM chip
Security Tools

Chrome's DBSC Finally Ships: Session Theft's Days Are Numbered

Forget endless cookie heists — Google's DBSC in Chrome 146 ties sessions to your hardware, making stolen creds worthless. It's the security leap we've craved.

4 min read 1 month, 1 week ago
Google Chrome browser icon with locked shield protecting session cookies from malware thief
Security Tools

Chrome's Hardware Trick to Kill Stolen Cookies: Smart Fix or Dev Headache?

Google just dropped a hardware-bound shield in Chrome against cookie-stealing malware. It's clever — but don't pop the champagne yet; real-world hackers adapt fast.

5 min read 1 month, 1 week ago
GitHub repository page showing leaked Claude Code with hidden malware warning
Cloud Security

Hackers Weaponize Claude Code Leak with Infostealer Malware on GitHub

Curious developers downloading leaked Claude Code from GitHub might wake up to stolen passwords and data. Anthropic's takedown scramble highlights sloppy AI security in a rush-to-market world.

4 min read 1 month, 2 weeks ago
Collage of virtual phones, malware icons, courtroom gavel, and router under threat
Cloud Security

Security's Wild Week: Phone Rentals, Stealer Swarms, and Meta's Reckoning

Banks thought two-factor was ironclad. Crooks just rented virtual phones to laugh it off. Welcome to security's latest clown show.

4 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details