Mobile devices have become the most personal—and most vulnerable—computing platforms in modern organizations. From private conversations … GhostChat Spyware: How a Fake Dating App Spies on YouRead more
Latest News
Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look Explained
For years, security teams have relied on Microsoft 365 Unified Audit Logs as a foundational control … Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look ExplainedRead more
GitLab Security Vulnerabilities Expose 2FA Bypass and DoS Risks
In modern DevSecOps environments, GitLab often sits at the heart of the software supply chain—managing source … GitLab Security Vulnerabilities Expose 2FA Bypass and DoS RisksRead more
Discord Clipboard Hijacker Stealing Crypto via Social Engineering
In late 2025, threat intelligence teams uncovered a Discord clipboard hijacker campaign that quietly drained cryptocurrency … Discord Clipboard Hijacker Stealing Crypto via Social EngineeringRead more
Major Gemini Flaw Exposes Your Private Calendar Data
In one of the most striking examples of AI‑driven security failure to date, researchers uncovered a … Major Gemini Flaw Exposes Your Private Calendar DataRead more
SolyxImmortal Malware: A Stealthy Python-Based Threat Targeting Windows Systems
In January 2026, researchers identified a new Python-based malware strain named SolyxImmortal—a silent, persistent, and highly … SolyxImmortal Malware: A Stealthy Python-Based Threat Targeting Windows SystemsRead more
ChatGPT Go Security: Risks, Controls & Enterprise Policy Guide
ChatGPT Go security is now a board-level conversation. With a global $8/month tier rolling out across … ChatGPT Go Security: Risks, Controls & Enterprise Policy GuideRead more
Russian Hacker Group Disrupted by Ukraine Police: Ransomware Operations Exposed
Ransomware continues to be one of the most destructive cyber threats worldwide, costing organizations hundreds of … Russian Hacker Group Disrupted by Ukraine Police: Ransomware Operations ExposedRead more
Malicious File Converter Apps: How Free Tools Infect Systems
In 2024 alone, initial access via trojanized software accounted for a growing share of enterprise malware … Malicious File Converter Apps: How Free Tools Infect SystemsRead more
ServiceNow AI Vulnerability Exposes Emerging Risks in Autonomous Agent Security
In late 2025, researchers uncovered a high‑severity ServiceNow AI vulnerability (CVE‑2025‑12420, CVSS 9.3) that exposed organizations … ServiceNow AI Vulnerability Exposes Emerging Risks in Autonomous Agent SecurityRead more