ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

Attackers are increasingly leveraging trusted components and everyday tools, from Linux rootkits to router 0-days, to infiltrate systems. This shift means the danger now lurks in seemingly normal things like updates, apps, and cloud services, making vigilance against supply chain threats and AI intrusions more critical than ever.
This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust. That is what makes it worrying. The danger is in normal things now - updates, apps, cloud buttons, support chats, trusted accounts. AI
This summary was generated from open reporting. Read the full original article ↗
Related
Supply Chain Security Crisis: Too Many Vulnerabilities, Too Little Visibility
New vulnerabilities are being discovered too fast, the time-to-exploitation is too short, and our visibility into them is largely lacking. The post Supply Chain Security Crisis: Too Many Vulnerabilities, Too Little Visibility appeared first on SecurityWeek .
Typosquatted npm package quietly exfiltrates CI secrets
A malicious package mimicking a popular build tool harvested environment variables during install and shipped them to an attacker endpoint. Pin your dependencies and treat postinstall scripts as hostile.
Discussion
Loading discussion…