Welcome to Red Circle Security’s Cybersecurity Intelligence Platform. We aggregate and analyze security news from leading industry sources to keep you informed about the latest threats, vulnerabilities, and security trends.

Our platform monitors dozens of trusted security sources and provides curated, organized access to critical security information.

Latest Security News

Browse our latest posts below or explore by topic to find security news relevant to your interests.

When Security Tools Become Attack Vectors: This Week's Supply Chain Wake-Up Call

When Security Tools Become Attack Vectors: This Week’s Supply Chain Wake-Up Call

I’ve been following security news for years, but this week’s stories really highlight how creative attackers are getting with their targeting strategies. While everyone’s talking about the Crunchyroll breach affecting 6.8 million anime fans, the story that’s keeping me up at night is actually about Aqua’s Trivy vulnerability scanner getting compromised.

The Irony of Hacking Security Tools

Here’s what happened with Trivy: attackers managed to publish a malicious scanner release and actually replaced legitimate tags to point to information-stealer malware. Think about that for a second – security teams around the world are using vulnerability scanners to protect their infrastructure, and now those very tools are being weaponized against them.

TeamPCP's Multi-Front Attack: When Wipers Meet Supply Chain Compromise

TeamPCP’s Multi-Front Attack: When Wipers Meet Supply Chain Compromise

We’re seeing something interesting unfold this week that’s worth paying attention to. The TeamPCP hacking group has been making moves across multiple attack vectors simultaneously, and their latest campaign shows how threat actors are getting more sophisticated about targeting specific regions while compromising the tools we rely on daily.

The Kubernetes Wiper That Knows Geography

Let’s start with the most unusual piece: TeamPCP is deploying a wiper malware that specifically targets Iranian systems through Kubernetes clusters. What makes this particularly noteworthy isn’t just the geopolitical targeting—it’s the technical approach. The malicious script actually checks system configurations to identify Iranian infrastructure before wiping everything clean.

When Attackers Move Faster Than Our Coffee Break: The 22-Second Reality Check

When Attackers Move Faster Than Our Coffee Break: The 22-Second Reality Check

I’ve been staring at some numbers from this week’s M-Trends report that honestly made me spill my coffee. We’re talking about initial access handoff times dropping to just 22 seconds. Twenty-two seconds. That’s barely enough time to realize something’s wrong, let alone do anything about it.

This isn’t just another “attackers are getting faster” story – it’s a fundamental shift that’s reshaping how we need to think about incident response and detection. When I started in security, we measured breach progression in hours or days. Now we’re down to seconds for that critical handoff from initial access brokers to the ransomware crews.

Supply Chain Attacks Are Getting Smarter: The Trivy Incident Shows How Attackers Are Targeting Our Tools

Supply Chain Attacks Are Getting Smarter: The Trivy Incident Shows How Attackers Are Targeting Our Tools

We’ve all been there – rushing to implement security tools in our CI/CD pipelines, confident we’re doing the right thing. But what happens when the very tools we trust to protect us become the attack vector? That’s exactly what happened with Trivy, and it’s a wake-up call we all need to hear.

When Security Tools Become Attack Vectors

A threat actor recently managed to weaponize Trivy, the popular open-source security scanner, turning it into an infostealer that targets CI/CD workflows. Think about that for a moment – they didn’t just compromise a random application or service. They went after a tool specifically designed to find vulnerabilities, knowing that security-conscious teams would be using it in their most sensitive environments.

North Korean Hackers Target Developers While AI Security Gaps Widen

North Korean Hackers Target Developers While AI Security Gaps Widen

As someone who’s spent the last decade watching threat actors adapt their tactics, I have to admit the latest campaign from North Korean hackers caught my attention. They’re now weaponizing something most of us use daily: Visual Studio Code’s task automation features.

Developers in the Crosshairs

The group behind the “Contagious Interview” campaign (also tracked as WaterPlum) has been busy since December, distributing their StoatWaffle malware through malicious VS Code projects. What makes this particularly clever is their abuse of VS Code’s tasks.json files – those handy automation scripts that developers rely on to streamline their workflows.

Perseus Android Malware Targets Your Notes App While CISA Sounds Alarms on Multiple Exploited Vulnerabilities

Perseus Android Malware Targets Your Notes App While CISA Sounds Alarms on Multiple Exploited Vulnerabilities

You know that feeling when you realize attackers have found a new angle you hadn’t considered? That’s exactly what happened this week with the discovery of Perseus, a new Android malware that’s doing something I haven’t seen before – it’s specifically targeting users’ note-taking apps to steal sensitive information.

While we’ve all gotten pretty good at warning people not to store passwords in plain text files, how many of us have explicitly told users not to jot down crypto wallet recovery phrases or banking details in their phone’s notes app? The Perseus malware is betting that not many of us have had that conversation, and honestly, they’re probably right.

Microsoft Intune Under Fire: Why CISA's Latest Warning Should Be Your Wake-Up Call

Microsoft Intune Under Fire: Why CISA’s Latest Warning Should Be Your Wake-Up Call

If you’ve been putting off that Intune security review, this week’s events might be the push you need. CISA just issued a stark warning to U.S. organizations about securing their Microsoft Intune deployments after cybercriminals used the endpoint management platform to completely wipe systems at medical technology giant Stryker.

This isn’t just another “patch your systems” advisory. When attackers can turn your own management tools against you, we’re looking at a fundamental shift in how we need to think about endpoint security.

Russian APTs Target Ukrainian Infrastructure While Critical Flaws Hit Enterprise Networks

Russian APTs Target Ukrainian Infrastructure While Critical Flaws Hit Enterprise Networks

It’s been one of those weeks where the threat landscape feels particularly active, and I wanted to walk through some developments that caught my attention. We’re seeing a concerning mix of nation-state activity and critical enterprise vulnerabilities that deserve our immediate focus.

Russian Groups Double Down on Zimbra Attacks

The most troubling news comes from Ukraine, where Russian APT groups are actively exploiting a Zimbra vulnerability to target critical infrastructure. According to SecurityWeek, this isn’t your typical phishing campaign - they’re leveraging insufficient CSS sanitization in HTML emails to execute inline scripts when messages are opened in browsers.

Password Resets Are the New Front Door for Attackers

Password Resets Are the New Front Door for Attackers

I was reviewing some recent security incidents this week, and something caught my attention that I think we all need to talk about. While we’ve been busy hardening our primary authentication systems with MFA, zero trust, and all the latest security controls, attackers have quietly shifted their focus to a much softer target: password reset workflows.

It’s one of those “why didn’t I think of that” moments. We spend months implementing robust login security, then leave the back door wide open with poorly designed password reset processes. And the bad news? This trend is accelerating alongside some pretty serious developments in mobile security and AI-related incidents.

Chrome's Encryption Cracked by New Malware While Quantum-Safe Web Gets Closer

Chrome’s Encryption Cracked by New Malware While Quantum-Safe Web Gets Closer

We’ve got some interesting developments this week that really highlight how the security game keeps evolving. A new piece of malware called VoidStealer just figured out how to crack Chrome’s supposedly bulletproof Application-Bound Encryption, while on the flip side, we’re seeing real progress toward a quantum-safe web that could actually make things faster, not slower.

VoidStealer Breaks Chrome’s Master Key Protection

Here’s something that should grab your attention: VoidStealer malware has found a clever way around Chrome’s Application-Bound Encryption (ABE) using what they’re calling a “debugger trick.”