Nation-state cyber operations increasingly blur the line between espionage, psychological manipulation, and digital repression. A newly … Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOsRead more
Latest News
Metasploit Framework Update Exposes Critical RCE Risks in Enterprise Apps
In modern enterprise environments, attackers no longer rely on single vulnerabilities—they chain them. That reality is … Metasploit Framework Update Exposes Critical RCE Risks in Enterprise AppsRead more
LLMjacking Exposed: How Attackers Hijack and Monetize AI Endpoints
Large Language Models (LLMs) are rapidly becoming core enterprise infrastructure—but attackers are already exploiting the weakest … LLMjacking Exposed: How Attackers Hijack and Monetize AI EndpointsRead more
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
Former Google Engineer Convicted for Stealing AI Trade Secrets for China
In a case highlighting the growing risks of economic espionage in AI, a federal jury recently … Former Google Engineer Convicted for Stealing AI Trade Secrets for ChinaRead more
175K Exposed Ollama Hosts Pose Severe Remote Code Execution Risks
Imagine a network of 175,000 AI servers, scattered across 130 countries, operating without security guardrails. Over … 175K Exposed Ollama Hosts Pose Severe Remote Code Execution RisksRead more
GhostChat Spyware: How a Fake Dating App Spies on You
Mobile devices have become the most personal—and most vulnerable—computing platforms in modern organizations. From private conversations … GhostChat Spyware: How a Fake Dating App Spies on YouRead more
Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look Explained
For years, security teams have relied on Microsoft 365 Unified Audit Logs as a foundational control … Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look ExplainedRead more
GitLab Security Vulnerabilities Expose 2FA Bypass and DoS Risks
In modern DevSecOps environments, GitLab often sits at the heart of the software supply chain—managing source … GitLab Security Vulnerabilities Expose 2FA Bypass and DoS RisksRead more
Discord Clipboard Hijacker Stealing Crypto via Social Engineering
In late 2025, threat intelligence teams uncovered a Discord clipboard hijacker campaign that quietly drained cryptocurrency … Discord Clipboard Hijacker Stealing Crypto via Social EngineeringRead more