OpenAI has publicly confirmed that state-linked cyber actors, including groups associated with China and Russia, exploited … State-Linked Threat Actors Used ChatGPT in Cyberattack Campaigns, OpenAI ConfirmsRead more
Author: Rakesh
87% of Organizations Exposed: Known Exploited Vulnerabilities in Active Software
Datadog’s State of DevSecOps 2026 report delivers one of the clearest warnings yet: 87% of organizations … 87% of Organizations Exposed: Known Exploited Vulnerabilities in Active SoftwareRead more
RustFS Console XSS Flaw Exposes Admin S3 Credentials in Critical Attack
A newly disclosed vulnerability in the RustFS Console has been classified as a critical stored XSS … RustFS Console XSS Flaw Exposes Admin S3 Credentials in Critical AttackRead more
Pentagon Designates Claude AI a National Security Risk as Federal Ban Begins
In an unprecedented move, the U.S. government has officially designated Anthropic, the creator of Claude AI, … Pentagon Designates Claude AI a National Security Risk as Federal Ban BeginsRead more
Metasploit Exploit Modules: Feb 2026 RCE & Evasion Update
Metasploit exploit modules just received a major February 2026 update that materially changes how red and … Metasploit Exploit Modules: Feb 2026 RCE & Evasion UpdateRead more
Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against Enterprises
In late 2025 and early 2026, security researchers began observing a surge in double‑extortion ransomware attacks … Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against EnterprisesRead more
ResidentBat Android Malware Enables Belarusian KGB Mobile Surveillance
Mobile devices are essential tools for communication and activism—but in repressive environments, they can become instruments … ResidentBat Android Malware Enables Belarusian KGB Mobile SurveillanceRead more
Critical ServiceNow AI Platform Vulnerability Enables Remote Code Execution
Enterprise automation platforms are critical for streamlining workflows, but they can also become targets for attackers. … Critical ServiceNow AI Platform Vulnerability Enables Remote Code ExecutionRead more
Critical Zyxel Vulnerabilities Allow Remote Command Execution
Network devices are the backbone of enterprise and home connectivity—but unpatched vulnerabilities can turn them into … Critical Zyxel Vulnerabilities Allow Remote Command ExecutionRead more
Malicious Ads Evade Google Screening Through 1Campaign Cloaking Platform
Digital advertising platforms are trusted channels for reaching audiences—but cybercriminals are increasingly weaponizing them. A new … Malicious Ads Evade Google Screening Through 1Campaign Cloaking PlatformRead more