Explore real-world engineering experiences from top tech companies.
Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
This article covers TA416, a China-aligned threat actor, resuming targeted campaigns against European government and diplomatic entities since mid-2025 using PlugX malware and OAuth-based phishing techniques.
Microsoft Defender Security Research Team details PHP-based web shells on Linux servers that use HTTP cookies as a stealthy command-and-control channel.
North Korean threat actors (UNC1069) compromised the Axios npm package via a targeted social engineering attack against its maintainer, Jason Saayman.
This article argues that third-party risk management (TPRM) has become a critical security challenge and a growth opportunity for MSPs and MSSPs.
A new variant of the SparkCat malware has been discovered on both the Apple App Store and Google Play Store, targeting cryptocurrency wallet recovery phrases via OCR.
Drift, a Solana-based decentralized exchange, lost $285 million in a sophisticated attack using durable nonces and social engineering, with evidence linking it to North Korean threat actors.
This article covers a large-scale credential harvesting campaign exploiting CVE-2025-55182, a critical Next.js vulnerability, to compromise 766 hosts across multiple cloud providers.
Cisco has released patches for two critical vulnerabilities (CVSS 9.8) affecting the Integrated Management Controller (IMC) and Smart Software Manager On-Prem (SSM On-Prem).
This post provides a defender's framework for securing VMware vSphere environments against BRICKSTORM malware, which establishes persistence at the virtualization layer beneath traditional security tools.
This week's ThreatsDay Bulletin covers a range of active cybersecurity threats including exploit chains, Android rootkits, and supply chain attacks.
Elastic Security Labs uncovered a financially motivated threat campaign (REF1695) using ISO file lures to distribute RATs and cryptocurrency miners since November 2023.
This report analyzes open source consumption patterns, vulnerability trends, and remediation data across container image projects from Q4 2025 through Q1 2026.