UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Ravie LakshmananMar 11, 2026DevSecOps / AI Security A threat actor known as UNC6426 leveraged keys stolen following the supply chain…
Virtual Machine News Platform
Ravie LakshmananMar 11, 2026DevSecOps / AI Security A threat actor known as UNC6426 leveraged keys stolen following the supply chain…
By Alessandro Mascellino Publication Date: 2026-02-25 14:30:00 IBM’s 2026 X-Force report reveals 44% rise in cyberattacks on public apps, driven…
Key Takeaways: PRC-linked hackers exploited a Dell RecoverPoint zero-day for nearly two years. The flaw enabled persistent access and advanced…
What happened? In December 2025, Huntress researchers uncovered a sophisticated attack campaign targeting VMware ESXi hypervisors, revealing a threat actor had developed…
By Carly Page Publication Date: 2026-01-16 13:00:00 A critical HPE OneView flaw is currently being exploited at scale, with Check…
By Berry Zwets Publication Date: 2026-01-16 13:57:00 Check Point Research has identified a coordinated attack campaign targeting CVE-2025-37164, a critical…
A new wave of ransomware attacks targeting virtual machine platforms has emerged, with the Akira ransomware group leading a campaign…
Akira Group Ransomware In the latter half of 2025, a new battleground has emerged in ransomware operations the hypervisor layer.…
By @CyberNews Publication Date: 2025-11-21 05:33:00 Oracle becomes a zero-day victim of its own E-Business Suite (EBS) after Cl0p ransomware…
By Shweta Sharma Publication Date: 2025-11-13 06:00:00 Implication for enterprise defense The attack challenges assumptions that identity management and network-access…