Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!

fast-draft Open VSX Extension Compromised by BlokTrooper

The KhangNghiem/fast-draft extension, listed on open-vsx.org/extension/KhangNghiem/fast-draft and now sitting above 26,000 downloads, had multiple malicious releases that execute a GitHub-hosted downloader and pull a second-stage RAT and infostealer from the BlokTrooper/extension repository. The confirmed malicious releases in the version line we inspected are 0.10.89, 0.10.105, 0.10.106, and 0.10.112.

Cato CTRL Threat Research: Vishing and Microsoft Teams Used to Deliver PhantomBackdoor

Cato CTRL has discovered a q-based delivery technique used against an Italy-based consumer services company associated with PhantomBackdoor, a multi-stage WebSocket-based backdoor previously reported in a Ukraine-focused spear phishing operation by SentinelOne. In SentinelOne’s earlier reporting, initial access relied on phishing lures and a ClickFix-style flow that triggered a staged PowerShell and ended with a WebSocket backdoor.

Glassworm Strikes Popular React Native Phone Number Packages

On March 16, 2026, two React Native npm packages from the AstrOOnauta were backdoored in a coordinated supply chain attack. Both releases added an identical install-time loader that fetches and executes a multi-stage Windows credential and crypto stealer, triggered by nothing more than a routine npm install. The affected packages are react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8.

What Healthcare Leaders Face After a Cyberattack

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with Errol Weiss, Chief Security Officer at Health-ISAC. Drawing on decades of experience across government, finance, and healthcare, Errol walks through what leaders actually face in the hours and weeks following a cyberattack. The conversation explores why healthcare remains a top ransomware target, how uncertainty shapes recovery decisions, and why trusted, anonymous information sharing has become one of the sector’s strongest defenses.

What is Agentic AI vs GenAI?

Everyone knows ChatGPT, but Agentic AI is where the real work happens. In this Agentic AI vs GenAI breakdown, we explain why Agentic AI is the next major leap, and what it means for your business and career. Here’s the difference: Generative AI (GenAI): Creates content. You ask, it writes, summarizes, or creates. Agentic AI: Does work. It is built on three core components: a brain (reasons), memory (context), and tools (the key that lets agents touch real systems like APIs and databases).

Ransomware Attacks Surge by 50% Even as Payments Drop

The number of ransomware attacks increased by 50% in 2025, even though the number of victims who decided to pay the ransom fell to an all-time low, according to a new report from Chainalysis. The size of the ransom for victims who did pay increased significantly, growing 368% year-over-year to nearly $60,000. The total ransom payments observed by Chainalysis last year amounted to $820 million.