<rss version='2.0'>
<channel>
<title>Scarlet Shark General News Feed</title>
<description>An RSS security news feed sourced from reputable and high-quality providers.</description>
<link>https://scarletshark.com/intel-lists/rss_newsfeed.php</link>
<image>
<url>https://cdn.scarletshark.com/images/favicon-192.png</url>
<title>Scarlet Shark General News Feed</title>
<link>https://scarletshark.com/intel-lists/rss_newsfeed.php</link>
</image>
<generator>Scarlet Shark RSS Generator</generator>
<ttl>10</ttl><lastBuildDate>2026-04-08 00:00:00</lastBuildDate>
<pubDate>2026-04-08 00:00:00</pubDate>
<item><title>Espionage for repression: hack-for-hire phishing campaign targets civil society in MENA</title>
<link>https%3A%2F%2Fwww.accessnow.org%2Fmena-phishing-2026%2F</link>
<pubDate>2026-04-08 00:00:00</pubDate>
</item>
<item><title>New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations</title>
<link>https%3A%2F%2Fblog.talosintelligence.com%2Fnew-lua-based-malware-lucidrook%2F</link>
<pubDate>2026-04-08 00:00:00</pubDate>
</item>
<item><title>Beyond BITTER: MENA Civil Society Targeted in Hack-For-Hire Operation Linked to BITTER APT</title>
<link>https%3A%2F%2Fwww.lookout.com%2Fthreat-intelligence%2Farticle%2Fbitter-hack-for-hire</link>
<pubDate>2026-04-08 00:00:00</pubDate>
</item>
<item><title>Notorious hacker returns with a new Mac stealer targeting $10K+ crypto wallets</title>
<link>https%3A%2F%2Fmoonlock.com%2Fnotorious-hacker-returns-notnullosx-stealer</link>
<pubDate>2026-04-08 00:00:00</pubDate>
</item>
<item><title>FrostArmada: All thriller, no (malware) filler</title>
<link>https%3A%2F%2Fwww.lumen.com%2Fblog-and-news%2Fen-us%2Ffrostarmada-forest-blizzard-dns-hijacking</link>
<pubDate>2026-04-07 22:09:18</pubDate>
</item>
<item><title>Snowflake customers hit in data theft attacks after SaaS integrator breach</title>
<link>https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fsnowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach%2F</link>
<pubDate>2026-04-07 00:00:00</pubDate>
</item>
<item><title>What we learned about TEE security from auditing WhatsApp's Private Inference</title>
<link>https%3A%2F%2Fblog.trailofbits.com%2F2026%2F04%2F07%2Fwhat-we-learned-about-tee-security-from-auditing-whatsapps-private-inference%2F</link>
<pubDate>2026-04-07 00:00:00</pubDate>
</item>
<item><title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</title>
<link>https%3A%2F%2Fthehackernews.com%2F2026%2F04%2Fdocker-cve-2026-34040-lets-attackers.html</link>
<pubDate>2026-04-07 00:00:00</pubDate>
</item>
<item><title>SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks</title>
<link>https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F04%2F07%2Fsoho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks%2F</link>
<pubDate>2026-04-07 00:00:00</pubDate>
</item>
<item><title>Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations</title>
<link>https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F04%2F06%2Fstorm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations%2F</link>
<pubDate>2026-04-06 00:00:00</pubDate>
</item>
<item><title>CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS</title>
<link>https%3A%2F%2Farcticwolf.com%2Fresources%2Fblog%2Fcve-2026-35616%2F</link>
<pubDate>2026-04-06 00:00:00</pubDate>
</item>
<item><title>Inside an AI‑enabled device code phishing campaign</title>
<link>https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F04%2F06%2Fai-enabled-device-code-phishing-campaign-april-2026%2F</link>
<pubDate>2026-04-06 00:00:00</pubDate>
</item>
<item><title>Mapping Ottercookie Infrastructure</title>
<link>https%3A%2F%2Fmedium.com%2Fwalmartglobaltech%2Fmapping-ottercookie-infrastructure-1c49f0cd3883</link>
<pubDate>2026-04-06 00:00:00</pubDate>
</item>
<item><title>TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments</title>
<link>https%3A%2F%2Fisc.sans.edu%2Fdiary%2F32864</link>
<pubDate>2026-04-03 13:18:01</pubDate>
</item>
<item><title>LinkedIn secretly scans for 6,000+ Chrome extensions, collects data</title>
<link>https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Flinkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data%2F</link>
<pubDate>2026-04-03 00:00:00</pubDate>
</item>
<item><title>You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 &amp; CVE-2026-2701)</title>
<link>https%3A%2F%2Flabs.watchtowr.com%2Fyoure-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701%2F</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
<link>https%3A%2F%2Fthehackernews.com%2F2026%2F04%2Fwhatsapp-alerts-200-users-after-fake.html</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>Mongoose: Preauth RCE and mTLS Bypass on Millions of Devices</title>
<link>https%3A%2F%2Fwww.evilsocket.net%2F2026%2F04%2F02%2FMongoose-Preauth-Remote-Code-Execution-and-mTLS-Bypass%2F</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit</title>
<link>https%3A%2F%2Fthehackernews.com%2F2026%2F04%2Fapple-expands-ios-1877-update-to-more.html</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>Threat Intelligence vSphere and BRICKSTORM Malware: A Defender's Guide</title>
<link>https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fvsphere-brickstorm-defender-guide%2F</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>Qilin EDR killer infection chain</title>
<link>https%3A%2F%2Fblog.talosintelligence.com%2Fqilin-edr-killer%2F</link>
<pubDate>2026-04-02 00:00:00</pubDate>
</item>
<item><title>Stranger Strings: Yurei Ransomware Operator Toolkit Exposed</title>
<link>https%3A%2F%2Fwww.team-cymru.com%2Fpost%2Fyurei-double-extortion-ransomware-campaign-toolkit</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>A laughing RAT: CrystalX combines spyware, stealer, and prankware features</title>
<link>https%3A%2F%2Fsecurelist.com%2Fcrystalx-rat-with-prankware-features%2F119283%2F</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>VEN0m Ransomware: il punto debole di Windows Defender</title>
<link>https%3A%2F%2Fwww.nexsys.it%2Fven0m-ransomware-punto-debole-defender%2F</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>STARDUST CHOLLIMA Likely Compromises Axios npm Package</title>
<link>https%3A%2F%2Fwww.crowdstrike.com%2Fen-us%2Fblog%2Fstardust-chollima-likely-compromises-axios-npm-package%2F</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>I’d come running back to EU again: TA416 resumes European government espionage campaigns</title>
<link>https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fblog%2Fthreat-insight%2Fid-come-running-back-eu-again-ta416-resumes-european-government-espionage</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>The Claude Code leak in four charts: half a million lines, three accidents, forty tools</title>
<link>https%3A%2F%2Fwww.randalolson.com%2F2026%2F04%2F02%2Fclaude-code-leak-four-charts%2F</link>
<pubDate>2026-04-01 00:00:00</pubDate>
</item>
<item><title>Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure</title>
<link>https%3A%2F%2Funit42.paloaltonetworks.com%2Fteampcp-supply-chain-attacks%2F</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing</title>
<link>https%3A%2F%2Fwww.rapid7.com%2Fblog%2Fpost%2Ftr-initial-access-broker-shift-high-value-targets-premium-pricing%2F</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets</title>
<link>https%3A%2F%2Fresearch.checkpoint.com%2F2026%2Foperation-truechaos-0-day-exploitation-against-southeast-asian-government-targets%2F</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack</title>
<link>https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fnorth-korea-threat-actor-targets-axios-npm-package</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>WhatsApp malware campaign delivers VBScript and MSI backdoors</title>
<link>https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F03%2F31%2Fwhatsapp-malware-campaign-delivers-vbs-payloads-msi-backdoors%2F</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>What's Really Running Inside Your Free VPN: A Mysterium VPN Research</title>
<link>https%3A%2F%2Fwww.mysteriumvpn.com%2Fblog%2Fnews%2Fwhats-really-inside-your-free-vpn</link>
<pubDate>2026-03-31 00:00:00</pubDate>
</item>
<item><title>Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild</title>
<link>https%3A%2F%2Fwww.wiz.io%2Fblog%2Ftracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>axios Compromised on npm - Malicious Versions Drop Remote Access Trojan</title>
<link>https%3A%2F%2Fwww.stepsecurity.io%2Fblog%2Faxios-compromised-on-npm-malicious-versions-drop-remote-access-trojan</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime</title>
<link>https%3A%2F%2Fresearch.checkpoint.com%2F2026%2Fchatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime%2F</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>China's DeepSeek suffers 7-hour outage, longest since launch</title>
<link>https%3A%2F%2Fcybernews.com%2Fai-news%2Fchinas-deepseek-7-hour-outage-longest-launch%2F</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>Let's Encrypt simulated revoking 3 million certificates. Most ACME clients didn't notice.</title>
<link>https%3A%2F%2Fwww.certkit.io%2Fblog%2Flets-encrypt-mass-revocation-simulation</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>New widespread EvilTokens kit: device code phishing as-a-service – Part 1</title>
<link>https%3A%2F%2Fblog.sekoia.io%2Fnew-widespread-eviltokens-kit-device-code-phishing-as-a-service-part-1%2F</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
<item><title>Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643</title>
<link>https%3A%2F%2Fbishopfox.com%2Fblog%2Fcve-2026-21643-pre-authentication-sql-injection-in-forticlient-ems-7-4-4</link>
<pubDate>2026-03-30 00:00:00</pubDate>
</item>
</channel>
</rss>
