Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Supply chain attacks hit Checkmarx and Bitwarden developer tools

Sophos X-Ops is aware of reports that two widely-used developer tools – the Checkmarx KICs security scanner and the Bitwarden CLI – were hijacked on April 22, 2026, to steal credentials from development environments. These attacks occurred within hours of each other and share the same command-and-control (C2) domain – potentially pointing to a single threat actor running a coordinated campaign. Both vendors have since reportedly contained the incidents.

Token Bingo: Don't Let Your Code be the Winner

In early April 2026, Arctic Wolf began tracking a large-scale device code phishing campaign impacting organizations across multiple regions and sectors. Similar to the widespread “Riding the Rails” campaign first observed in late March by Huntress, the threat actors were observed abusing OAuth device code flow to trick victims into providing authentication codes and obtain initial access into victim environments.

10 Essential Tools Every Cybersecurity Professional Uses

Working in cybersecurity means that you are constantly dealing with all kinds of potential threats. And that's why it's inherently important to find ways of improving that security, which can prove to be very challenging a lot of the time. But that's why cybersecurity professionals are continually relying on professional tools to get their job done. Here's what they are using.

Designing Scalable Discord Collaboration Architectures for High-Efficiency Digital Workflows

Discord didn't really start as anything "serious." It was just a simple place for people to talk in communities, hang out, share ideas, that sort of thing. But if you look at how people use it now, it's completely different. A lot of teams-small startups, online groups, even remote working setups-are running daily communication through Discord. Not because it's fancy, but because it keeps everything in one place. You don't need five different apps open just to stay updated.

When a National VPN Crackdown Broke the Banks: What Russia's April 3 Outage Teaches Enterprise Security Leaders

On the afternoon of April 3, 2026, shoppers in Moscow discovered their contactless payments were dead. Payment terminals at Sberbank, VTB, and T-Bank - three of Russia's largest banks - threw errors simultaneously. The Moscow metro opened its turnstiles and waved commuters through. Restaurants reverted to cash. A zoo in the south of the country briefly stopped admitting paying visitors. The outage was not a cyberattack, a cloud failure, or a ransomware event. It was the Russian telecom regulator, Roskomnadzor, trying to block VPN traffic - and accidentally blackholing IP ranges belonging to its own critical banking infrastructure.

Overlooked Security Risks in Vehicle Relocation and How They're Being Solved

Vehicle relocation is often treated as a simple logistics task. You book a transporter, hand over the keys, and wait for delivery. What tends to be overlooked is the range of risks that exist throughout that journey. These risks are not always obvious, and many of them occur in moments people rarely consider. At the same time, the industry is evolving. New systems, better processes, and smarter technology are reshaping how vehicles are transported, making the entire process far more secure and transparent than before.

Key Benefits Of Fleet Management Systems You Can't Ignore

Running a large fleet of commercial vehicles is a complex task for any business owner. You have to handle scheduling and maintenance, and watch the bottom line closely at the same time. Smart digital solutions offer a way to organize every detail from a single dashboard. These tools help teams stay on schedule and reach their goals with much less stress for the drivers.

Microsoft 365 retention vs. backup vs. archiving: What's the difference?

Microsoft 365 is great for sharing, creating and collaborating on data. Protecting data, however, is something else altogether. It’s not so easy. Many organizations assume Microsoft fully protects their information, only to discover gaps when something goes wrong. That’s why data retention, backup and archiving are so important. The three concepts have some similarities, but they serve very different purposes. More importantly, you can’t substitute one for another.

Securing GenAI Code: Manage Risk from Code to Cloud

The productivity revolution promised by AI coding assistants has arrived. Developers are shipping features faster than ever, with tools like GitHub Copilot, Amazon CodeWhisperer, and Claude Code becoming as essential to modern development as Git itself. But beneath this velocity lies a troubling reality that every security leader needs to confront: we’re scaling security debt at unprecedented speed.