Please turn JavaScript on
header-image

Security Risk Advisors

follow.it gives you an easy way to subscribe to Security Risk Advisors's news feed! Click on Follow below and we deliver the updates you want via email, phone or you can read them here on the website on your own news page.

You can also unsubscribe anytime painlessly. You can even combine feeds from Security Risk Advisors with other site's feeds!

Title: A Leader in Cybersecurity Services - Security Risk Advisors

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  2.41 / day

Message History

Trend Micro reported in March 2026 that the Russia-aligned APT group Pawn Storm (APT28/Fancy Bear) is actively targeting Ukrainian defense supply chains and allied infrastructure using a new malware framework named PRISMEX. The campaign has been active since at least September 2025 and escalated significantly in early 2026, targeting governm...


Read full story

Sekoia reported in March 2026 ongoing campaigns by the China-linked Silver Fox intrusion set, which blends cybercrime and espionage techniques. The group uses tax-themed phishing emails and fake government communications to lure victims—primarily across South Asia—into executing malicious payloads. These campaigns have evolved significantly ...


Read full story

Summary: Unit 42 reported in March 2026 that threat group TeamPCP conducted a large-scale supply chain attack compromising widely trusted security and developer tools, including Trivy, KICS, LiteLLM, and the Telnyx Python SDK. The campaign injected malicious code into GitHub Actions workflows and PyPI packages, allowing payloads to execute a...


Read full story

Malwarebytes reported on March 26, 2026 a supply chain malware campaign named GlassWorm that targets developers through compromised or malicious packages distributed via repositories such as npm, PyPI, GitHub, and Visual Studio Code extensions. The campaign begins when a developer installs or updates a seemingly legitimate package that has b...


Read full story

Microsoft Defender Security Research reported in March 2026 an active malware campaign observed since late February 2026 that uses WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The campaign targets Windows systems and relies on user execution of scripts delivered through a trusted messaging platform. Once execute...


Read full story