Microsoft’s durabletask package on PyPi Compromised. Mini Shai Hulud attacks again… again!
By aikido.dev Publication Date: 2026-05-19 00:00:00 We’ve identified three malicious versions of durabletask on PyPI, 1.4.1, 1.4.2, and 1.4.3, that…
Virtual Machine News Platform
By aikido.dev Publication Date: 2026-05-19 00:00:00 We’ve identified three malicious versions of durabletask on PyPI, 1.4.1, 1.4.2, and 1.4.3, that…
Cybercriminals are using compromised Amazon credentials to launch attacks that leverage infrastructure trusted by users and security systems alike. https://www.forbes.com/sites/daveywinder/2026/05/06/uptick-in-attacks-amazon-weaponized-as-compromised-credentials-used/
By Jessica Lyons Publication Date: 2026-04-07 20:19:00 Hundreds of organizations have been compromised daily by a Microsoft device-code phishing campaign…
By Meduza Publication Date: 2026-03-13 21:10:00 In late 2022, Russia established a top-secret unit of elite intelligence agents with a sweeping mandate to carry out…
By Tushar Subhra Dutta Publication Date: 2026-03-09 08:22:00 A wave of counterfeit AI-powered browser extensions has silently breached over 20,000…
By Davey Winder Publication Date: 2026-03-01 14:40:00 Malicious Google Lens tool stole crypto credentials. NurPhoto via Getty Images Google users…
By Eduard Kovacs Publication Date: 2025-12-30 08:50:00 South Korean airline Korean Air has disclosed a data breach that exposed 30,000…
By Sead Fadilpašić Publication Date: 2025-12-30 18:20:00 Korean Air lost data on approximately 30,000 employees due to a KC&D supply…
Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using…
The Dutch Public Prosecution Service (part of the Department of Justice) is gradually resuming internet connections after going offline on…