theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability71malware15policy14breach5apt4ransomware1
Aapt

UNC1069 North Korean APT Executes Targeted Social Engineering to Compromise Axios NPM Package

North Korean APT group UNC1069 targeted the Axios npm package via a tailored social engineering attack against its maintainer. The campaign aimed to insert malicious code into this critical open-source library, posing risks to global software supply chains. Detection methods include MFA, cryptographic signing, and vigilant monitoring of package updates.

The Hacker News·3h ago·2 min read
Aapt

Coruna iOS Exploit Kit: US-Origin iPhone Hacking Toolkit Now Deployed by Russian Intelligence

Google Threat Intelligence identified Coruna, a sophisticated iOS exploit kit leveraging 23 vulnerabilities across five complete exploit chains to silently install malware via drive-by web delivery. Former L3Harris Trenchant employees confirmed the toolkit originated within the US defense contractor's offensive cyber division before being sold to Russian intelligence, which has deployed it against targets in Ukraine. Organizations should enforce iOS Lockdown Mode on high-risk devices, deploy mobile threat defense tooling, and immediately ingest Google's published IOCs.

Schneier on Security·1d ago·4 min read
Aapt

Third-Party Resellers Undermine Government Efforts to Restrict Spyware Distribution

A recent study reveals that third-party resellers and brokers undermine government restrictions on spyware distribution by exploiting opaque supply chains and enabling continued proliferation. This activity complicates detection, attribution, and enforcement efforts, highlighting the need for enhanced supply chain risk management and international regulatory cooperation.

Dark Reading·8d ago·2 min read
Aapt

TeamPCP Conducts Targeted Attacks on DevSec Tools and AI Libraries

TeamPCP has orchestrated targeted supply chain attacks against developer security tools such as Trivy, Checkmarx's KICS, VS Code plug-ins, and the LiteLLM AI library. These attacks aim to compromise software development environments, enabling espionage and data theft. Security teams should enhance supply chain protections, apply timely patches, and monitor for indicators of compromise related to TeamPCP activity.

Dark Reading·9d ago·2 min read