Aggregator
Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware
The developers of Notepad++ disclosed a critical security breach on February 2, 2026, affecting their update infrastructure. The popular text editor, widely used by developers worldwide, became the target of a sophisticated supply chain attack that remained undetected for several months. According to the official statement, attackers gained unauthorized access through a hosting provider-level incident […]
The post Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware appeared first on Cyber Security News.
New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure
Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials
GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
分析 Notepad++ 的供应链攻击
Submit #742676: Wekan <8.21 Missing authorization on admin function (CWE-284) [Accepted]
Submit #742671: Wekan <8.21 Missing authorization checks leading to information disclosure a [Accepted]
Submit #742670: Wekan <8.21 Improper access control on administrative migration methods (CWE [Accepted]
Submit #742666: Wekan <8.21 Improper access control (CWE-284) [Accepted]
Submit #742663: Wekan <8.21 IDOR via REST API / improper object relationship validation [Accepted]
Submit #742662: Wekan <8.21 IDOR via REST API / improper object relationship validation [Accepted]
Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI
The chatbot era has ended. For two years, we’ve interacted with digital assistants that summarize emails and suggest recipes, but the National Institute of Standards and Technology (NIST) now draws a definitive line between machines that talk and machines that act. Their newly released Request for Information (RFI) signals a fundamental paradigm shift in how..
The post Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI appeared first on Security Boulevard.
ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details
A sophisticated malware campaign has surfaced where threat actors are distributing the ValleyRAT backdoor disguised as a legitimate installer for the popular messaging application, LINE. This targeted attack primarily focuses on Chinese-speaking users, leveraging a deceptive executable to infiltrate systems and compromise sensitive login credentials. The malware employs a complex loading chain involving shellcode execution […]
The post ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details appeared first on Cyber Security News.