Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malicious node-ipc versions published to npm in suspected maintainer account compromise

On May 14, 2026, multiple malicious versions of the popular npm package node-ipc were published to the npm registry. Current public reporting identifies node-ipc@9.1.6, node-ipc@9.2.3, and node-ipc@12.0.1 as compromised versions containing an obfuscated credential-stealing payload. The malicious code was added to the CommonJS bundle, node-ipc.cjs, and is triggered when the package is loaded through require("node-ipc").

DDoS Protection for Healthcare: Uptime, Compliance, and Patient Safety

Healthcare absorbed ~24 million attacks in 2025, a 115% increase year over year, according to the Indusface State of Application Security 2026 report. DDoS alone grew 39% across the sector. But disruption here is not just about lost revenue or downtime. When systems go dark, emergency rooms divert patients, doctors lose access to electronic health records, and appointments are cancelled.

Regulation E and Digital Banking Fraud: What Financial Institutions Need to Know

Fake banking sites aren’t just a customer problem. CFPB guidance makes clear that when a fraudster obtains account access information through deception and uses it to initiate a covered EFT, the transfer may qualify as an unauthorized EFT under Regulation E. That means cloned login pages can create investigation obligations, provisional credit requirements, and reimbursement exposure for banks, even when the customer typed the password themselves.

Why Integrate Threat Intelligence Feeds into Email Security?

It's getting harder to distinguish legitimate emails from malicious ones as phishing messages mimic real conversations, use trusted domains and increasingly leverage AI to scale and refine attacks. This shift is forcing organizations to rethink how they approach email security. Static controls that rely on known indicators can't keep up with threats that are evolving daily. To close that gap, teams need email security systems with integrated threat intelligence feeds.

Redesigning Security Culture for the Agentic Age

The launch of platforms like Moltbook, OpenClaw, and RentAHuman in early 2026 has provided an unsettling glimpse into the future. We are entering a phase of the digital workplace where AI agents no longer just assist us, they interact with one another, act autonomously in the physical world, and even hire humans for manual labor. In this environment, the traditional lines of control and agency are being redrawn.

Traffic-Themed SMS Phishing Targets Users Around the World

Researchers at Bitdefender are tracking 40 separate SMS phishing (smishing) campaigns impersonating transport authorities, toll operators, and parking services around the world. The researchers have observed more than 79,000 scam text messages with over 29,000 unique variants. The attacks are targeting users in multiple languages. “These scam messages are designed to create a sense of urgency and pressure drivers into acting quickly,” the researchers write.

DDI Central 6.2: Now with GSS TSIG authentication, LDAP and LDAPS user provisioning, and Native Windows scavenging

DDI Central version 6.1 introduced significant enhancements to the IPAM section, bringing a segmented view for sites, clusters, and supernets, along with multiple display options: table, tree, and card views. The release also added trusted feed configurations, root hint templates, and unmapped subnet monitoring, giving network admins greater flexibility and control over their DNS and DHCP resources.

BlueVoyant Strengthens Cyber Defence for ODEON Cinemas Group Across Eight Countries

BlueVoyant announces that it has partnered with ODEON Cinemas Group (OCG), Europe's largest cinema operator, to unify and modernise its security operations across eight countries. The collaboration delivers 24/7 protection, rapid incident response, and enhanced visibility into thirdparty risk, significantly reducing operational noise and strengthening OCG's overall cyber resilience.