Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hidden Vulnerabilities Sitting On Everyday Work Devices

In the modern workplace, the hum of productivity is typically accompanied by the quiet, persistent glow of computer monitors, the chime of incoming emails, and the seamless operation of countless software applications. These devices, such as laptops, desktops, smartphones, and tablets, are the engines of business operations. However, beneath the surface of this digital efficiency lies a landscape of hidden vulnerabilities. These aren't the flaws of sophisticated cyber-attacks, but the mundane, overlooked security gaps inherent in the very tools employees use every day.

A New Wave of Supply-Chain Chaos: SHA1HULUD Malware Hijacks NPM Ecosystem and Exfiltrates Developer Secrets

A previously known malware strain, SHA1-HULUD, has resurfaced with a large-scale software supply-chain attack targeting the NPM ecosystem. More than 300 open-source NPM packages were maliciously modified within a short window, leading to the theft of sensitive credentials and over 20,000 compromised GitHub repositories.

How To Combat AI-Enhanced Social Engineering Attacks

Artificial intelligence (AI) has supercharged social engineering. Global management consulting firm McKinsey & Company reported a 1,200% global surge in phishing attacks since the rise of generative AI in the latter half of 2022. And it’s not just the number of attacks that’s climbing; it’s also the success rate. Arctic Wolf’s Human Risk Behavior Snapshot: 2nd Edition reveals that nearly two-thirds of IT and security leaders self-reported falling for a phishing attempt.

SHA1-Hulud, npm supply chain incident

On November 24th, 2025, we identified a new supply chain attack in the npm ecosystem, referred to as SHA1-Hulud. We believe this is a second wave of the Shai-Hulud attack, which occurred in September 2025. Snyk will continue monitoring this active incident until it is resolved. Updates on this incident will be on our trust center.

Stateless vs. Stateful: The Difference in Cyber Attacks #StatefulAttack #businesslogic #apisecurity

The Hacker is Having a Conversation with Your API. There are two kinds of attacks you MUST understand: Stateless (Brute Force): One-and-done, instant gratification. Think SQL Injection. Stateful (Sophisticated): A persistent conversation over time. This is the signature of Business Logic Abuse. Why does this matter? Stateful attacks are executed by sophisticated threat actors who have done their due diligence on your architecture. You must evolve your defenses to monitor the entire session, not just single requests!

How AI-Driven Attacks Are Putting Gmail Security At Risk

Gmail has always been a common target for cybercriminals, and with the arrival of advanced AI tools, the threat level has increased significantly. Now, attackers no longer rely on generic phishing emails or scam methods. They are using AI to create convincing messages and imitate real support agents to make attacks look more genuine. This change in attack patterns has made Gmail users more vulnerable because they can’t differentiate between real and fake messages.

Multimodal Attacks and Model Drift: The Future of AI Exploitation

Multimodal Attacks and Model Drift: The Future of AI Exploitation A10 security experts Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal discuss the critical vulnerabilities emerging from multimodal AI agents (systems that perceive, decide, and act) and the absolute need for security mechanisms external to the Large Language Model (LLM) itself. The experts dive into why traditional security is failing and what the next evolution of defense must look like.

The MemcycoFM Show: Ep 18 - SOC Defense Against Credential Replay Attacks

In a recent blog post from @Memcyco , we discussed how credential replay remains one of the most efficient ways attackers turn stolen usernames, passwords, or tokens into real account access. Verizon’s 2024 DBIR shows that over 40% of breaches involve stolen credentials, underscoring the durability of this tactic. Even strong authentication is not immune. Techniques like pass-the-cookie and adversary-in-the-middle phishing allow attackers to replay tokens and sidestep MFA. Remote-access scams add another layer, handing fraudsters direct control of devices and sessions.

Lookalike Domain Attacks Explained

Your potential customers could be interacting with a malicious website that resembles your company's website. This dangerous cyber risk, known as a lookalike domain, is on the rise, with 80% of registered web domains in 2024 resembling 2000 global brands. This article explains what lookalike domains are, their impact on your brand, and why these attacks are increasing, providing real-time strategies to protect your business from domain spoofing.

Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach and impact. Their goal is to exploit the weaknesses in organizations’ fast-growing and complex environments.