CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

May 1, 2026 No Comments

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft,

Read More »

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

April 30, 2026 No Comments

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct

Read More »

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

April 30, 2026 No Comments

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some

Read More »

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

April 30, 2026 No Comments

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide

Read More »

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

April 30, 2026 No Comments

Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts

Read More »

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

April 30, 2026 No Comments

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity

Read More »
Load More