Ransomware & Malware

When One Attacker Rules Them All: The Ivanti Exploitation Campaign That Should Worry Us

When One Attacker Rules Them All: The Ivanti Exploitation Campaign That Should Worry Us

I’ve been watching the security news this week, and there’s a pattern emerging that’s worth discussing. While we’re dealing with the usual mix of browser extension malware and acquisition announcements, there’s one story that really stands out – and it’s not getting the attention it deserves.

The Ivanti Problem Gets Personal

Here’s what caught my eye: researchers are reporting that a single threat actor is responsible for 83% of the active exploitation targeting two critical vulnerabilities in Ivanti Endpoint Manager Mobile. We’re talking about CVE-2026-21962 and CVE-2026-24061 – both remote code execution flaws that are exactly as bad as they sound.

From Poland's Power Grid to Chrome Extensions: This Week's Security Wake-Up Calls

From Poland’s Power Grid to Chrome Extensions: This Week’s Security Wake-Up Calls

I’ve been following several concerning developments this week that really highlight how quickly our threat environment is shifting. From critical infrastructure attacks to browser extensions gone rogue, there’s a lot we need to unpack.

The Poland Energy Attack: A Reality Check for Critical Infrastructure

Let’s start with the big one. The cyberattack on Poland’s energy grid in late December has prompted both UK and US cyber agencies to issue urgent warnings to critical infrastructure operators. Fortra’s analysis shows this wasn’t just another ransomware group looking for a quick payout – this was a coordinated attack specifically targeting energy infrastructure.

When Luxury Brands Meet Basic Security Failures: $25M in Fines and What It Means for the Rest of Us

When Luxury Brands Meet Basic Security Failures: $25M in Fines and What It Means for the Rest of Us

You know that feeling when you see a data breach notification and think “not again”? Well, this week brought us a particularly expensive reminder that even the most prestigious brands can fumble basic security practices. South Korea just hit Louis Vuitton, Christian Dior, and Tiffany with a collective $25 million fine for data breaches affecting over 5.5 million customers – and honestly, it’s about time we started seeing real financial consequences for security negligence.

North Korean Hackers Are Now Targeting Developers Through Fake Job Interviews

North Korean Hackers Are Now Targeting Developers Through Fake Job Interviews

I’ve been tracking an interesting evolution in North Korean threat actor tactics, and honestly, it’s pretty clever – and concerning. They’ve moved beyond the typical phishing emails and are now targeting JavaScript and Python developers through fake job interviews that include malicious coding challenges.

The New Developer-Focused Attack Vector

According to BleepingComputer, these North Korean groups are specifically going after developers with cryptocurrency-related coding tasks. Think about it from an attacker’s perspective – developers are high-value targets with privileged access to systems, and they’re naturally inclined to download and run code as part of their daily work.

AI Poisoning and Plummeting Patch Windows: Why This Week's News Should Keep Us All Awake

AI Poisoning and Plummeting Patch Windows: Why This Week’s News Should Keep Us All Awake

You know that sinking feeling when you realize the threat landscape just shifted under your feet again? Well, grab another coffee because this week brought some developments that fundamentally change how we need to think about AI security and vulnerability management.

When AI Becomes the Attack Vector

Microsoft just dropped some research that should make every CISO pause before clicking that next “Summarize with AI” button. They found AI recommendation poisoning attacks across 31 companies in 14 different industries, and here’s the kicker – the tools to pull this off are apparently “trivially easy” to use.

The Lazarus Group's Supply Chain Gambit Shows Why We Can't Automate Our Way Out of Every Problem

The Lazarus Group’s Supply Chain Gambit Shows Why We Can’t Automate Our Way Out of Every Problem

I’ve been digging through this week’s security news, and there’s a fascinating tension emerging between our push for automation and the persistent reality of sophisticated human adversaries. Let me walk you through what caught my attention and why it matters for how we’re building our defenses.

North Korea’s Patient Supply Chain Game

The biggest story this week is the Lazarus Group’s latest supply chain attack, where they’ve been quietly seeding malicious packages across npm and PyPI repositories since May 2025. They’re calling this campaign “graphalgo” after the first npm package they published, and it’s built around fake recruitment themes – classic Lazarus playbook.

Ransomware Gangs Are Weaponizing Your Employee Monitoring Tools

Ransomware Gangs Are Weaponizing Your Employee Monitoring Tools

I came across something this week that made me do a double-take. The Crazy ransomware gang has figured out how to turn our own employee monitoring software against us, using legitimate tools like SimpleHelp to maintain persistence in corporate networks. It’s one of those “why didn’t I see this coming” moments that keeps us all humble in this field.

When Legitimate Tools Become Attack Vectors

Here’s what’s particularly clever about this approach: the Crazy ransomware operators are abusing employee monitoring software to blend into normal network traffic. Think about it from their perspective – what better way to maintain long-term access than through tools that are supposed to be there?

When Legitimate Tools Become Attack Vectors: This Week's Supply Chain Wake-Up Call

When Legitimate Tools Become Attack Vectors: This Week’s Supply Chain Wake-Up Call

I’ve been digging through this week’s security incidents, and there’s a clear pattern emerging that should have all of us paying attention. We’re seeing attackers increasingly target legitimate platforms and tools rather than building their own infrastructure from scratch. It’s a smart strategy that’s proving frustratingly effective.

The Microsoft Store Becomes a Phishing Platform

The most eye-opening incident this week involves the AgreeTo Outlook add-in being hijacked to steal over 4,000 Microsoft account credentials. Think about that for a moment – this wasn’t some sketchy software downloaded from a questionable website. This was a legitimate add-in distributed through Microsoft’s own store that got compromised and turned into a credential harvesting operation.

North Korea Goes Full AI While Windows Notepad Becomes an Attack Vector

North Korea Goes Full AI While Windows Notepad Becomes an Attack Vector

I’ve been tracking some particularly interesting developments this week that show just how creative threat actors are getting. From North Korean hackers using deepfakes to infiltrate crypto companies to a Windows Notepad vulnerability that caught everyone off guard, we’re seeing attack methods that would have seemed like science fiction just a few years ago.

When Your Video Call Isn’t Really a Video Call

The most fascinating story has to be North Korea’s UNC1069 group and their sophisticated campaign against cryptocurrency firms. These aren’t your typical phishing attempts – they’re using deepfake video calls to build trust with targets before deploying their payloads.

The Stealth Shift: Why Cyber Attackers Are Going Underground While We're Still Fighting the Last War

The Stealth Shift: Why Cyber Attackers Are Going Underground While We’re Still Fighting the Last War

Remember when ransomware was the big scary monster keeping us all up at night? Well, according to some new research from Picus Labs, we might be fighting the last war while attackers have quietly shifted tactics right under our noses.

Their Red Report 2026 analyzed over 1.1 million malicious files and tracked 15.5 million adversarial actions throughout 2025, and what they found should make us all take a step back. The era of loud, disruptive ransomware attacks might be giving way to something far more insidious: what they’re calling “digital parasites”.