Ghostwire

Real-time cybersecurity intelligence aggregated from 130+ sources

Last updated: Tue, 31 Mar 2026 14:57:44 GMT

Trending Threats

Axios NPM Packages Breached in Ongoing Supply Chain Attack

0 articles

Iran-linked hackers breach FBI chief’s email

0 articles

U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog

0 articles

A Vulnerability in F5 Products Could Allow for Remote Code Execution

0 articles

[Перевод] Как Microsoft «исправляет» Windows 11: цветы после побоев

0 articles

Is your Agentic AI impenetrable by cyber threats?

0 articles

Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Memory Overread

0 articles

Ransomware in 2025: Blending in is the strategy

0 articles

Latest Articles (30 from 9 sources)

ReversingLabs

OWASP GenAI Security Project ramps up guidance

With AI ramping up risk, OWASP stepped up its project to help AppSec teams get up to speed — and take action.

The Record

New criminal service plans to monetize data stolen by ransomware gangs

A site called Leak Bazaar pitches itself as something closer to a data-processing business than a typical hacking or ransomware-as-a-service operation.

CyberPress

Axios NPM Packages Compromised in Active Supply Chain Attack

A severe and sophisticated supply chain attack has struck the widely used Axios HTTP client on the npm registry, exposing millions of developers worldwide to a cross-platform remote access trojan (RAT...

CyberPress

PNG Vulnerabilities Allow Attackers to Crash Systems and Leak Sensitive Data

Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network Graphics (PNG) image files. These critical f...

The Hacker News

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unaut...

The Record

CISA tells federal agencies to patch Citrix NetScaler bug by Thursday

The bug enables threat actors to send requests that disclose sensitive information and carries a severity score of 9.3 out of 10, indicating a critical risk.

Infosecurity Magazine

ChatGPT Security Issue Enabled Data Theft via Single Prompt

OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole

GBHackers

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, making attacks faster, quieter, and harder to s...

Infosecurity Magazine

TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets

TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs

CyberPress

Dutch Ministry of Finance Takes Systems Offline Following Cyberattack

The Dutch Ministry of Finance has taken several critical internal systems offline following the discovery of unauthorized access to its Information and Communication Technology (ICT) infrastructure in...

The Hacker News

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack...

The Hacker News

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCr...

CyberPress

Google Unveils Ransomware Detection and File Recovery for Google Drive

Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to organizations and individual users worldwid...

FreeBuf

Claude Code 源码泄露事件技术复盘:AI Agent 时代的前端安全新风险

2025–2026 年间,开发者社区和攻防圈陆续爆出多起“Claude Code 源码泄露”案例。这并不是一次官方披露的单一重大漏洞(如 Log4Shell 级别),而是一类典型的前端 + DevOps 配置失误,被 AI 编程 Agent 工具显著放大的供应链级信息泄露事件。结论:所谓“Claude Code 源码泄露”,本质不是 Claude 模型本身被攻破,而是开发者在使用 Claude C

GBHackers

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over infected systems. Instead of relying on a t...

FreeBuf

当篮球遇见AI:阿里云为“我的NBA手办”装上AI安全护栏

NBA X 阿里云

Infosecurity Magazine

Employee Data Breaches Surge to Seven-Year High

Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches

CyberPress

Apple’s macOS Tahoe Introduces Protection Against ClickFix Attacks

Apple has quietly rolled out a critical security feature in macOS Tahoe 26.4 that intercepts malicious commands before they execute in the Terminal application, directly targeting the growing threat o...

GBHackers

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than traditional credential phishing. The service...

CyberPress

CareCloud Data Breach: Hackers Access IT Systems, Steal Patient Data

CareCloud, Inc., a leading healthcare technology provider, has disclosed a significant cybersecurity incident after an unauthorized third party breached one of its Electronic Health Record (EHR) envir...

Infosecurity Magazine

NCSC Urges Immediate Patching of F5 BIG-IP Bug

The National Cyber Security Centre wants UK firms to patch CVE-2025-53521

CyberPress

Zero-Day Alert: Claude AI Finds Critical RCE Bugs in Vim and Emacs

Security researchers at Calif have demonstrated how a simple conversational prompt to Claude AI was enough to uncover critical zero-day Remote Code Execution (RCE) vulnerabilities in two of the most w...

SANS ISC

Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)

In case of a cyber incident, most organizations fear more of data loss (via exfiltration) than regular data encryption because they have a good backup policy in place. If exfiltration happened, it mea...

GBHackers

Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns

Cybercriminals are once again exploiting global tax seasons, abusing IRS and tax filing lures to deliver malware, remote monitoring and management (RMM) tools, and credential phishing in a wave of new...

InfoSec Write-ups

️ SQL Injection for Beginners: The Complete Guide

Welcome to one of the most important topics in cybersecurity! SQL Injection is a vulnerability that has been around since the late 1990s…Continue reading on InfoSec Write-ups »

CyberPress

Notepad++ v8.9.3 Update Fixes cURL Vulnerability and Crash Bugs

Notepad++, the widely used open-source text and code editor for Windows, has released version 8.9.3, a significant update that patches a tracked cURL security vulnerability, resolves multiple crash re...

InfoSec Write-ups

Why Most Cybersecurity Beginners Never Become Hackers

I watched hundreds start the journey. Only a few made it to the other side.Continue reading on InfoSec Write-ups »

InfoSec Write-ups

Before You Touch Nmap: Networking Fundamentals Every Beginner Must Understand

InfoSec Write-ups

SAR — CVE-2019–12454 in sar2html and a Writable Cron Script That Got Me Root | OffSec PG

InfoSec Write-ups

Understanding OT Cybersecurity: A Practical Guide to Asset Inventory for Industrial Control…

Industrial control systems run the backbone of our modern world — from power grids and water treatment plants to manufacturing floors and…Continue reading on InfoSec Write-ups »