Phishing is no longer confined to the browser. A fast‑growing tactic—WebDAV malware delivery—leverages legacy behavior in … WebDAV Malware Delivery: How Hackers Exploit Windows File ExplorerRead more
ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise Defenses
Phishing has evolved beyond look‑alike domains and typo‑squats. Recent research exposes ARPA TLD phishing, where threat … ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise DefensesRead more
State-Linked Threat Actors Used ChatGPT in Cyberattack Campaigns, OpenAI Confirms
OpenAI has publicly confirmed that state-linked cyber actors, including groups associated with China and Russia, exploited … State-Linked Threat Actors Used ChatGPT in Cyberattack Campaigns, OpenAI ConfirmsRead more
87% of Organizations Exposed: Known Exploited Vulnerabilities in Active Software
Datadog’s State of DevSecOps 2026 report delivers one of the clearest warnings yet: 87% of organizations … 87% of Organizations Exposed: Known Exploited Vulnerabilities in Active SoftwareRead more
RustFS Console XSS Flaw Exposes Admin S3 Credentials in Critical Attack
A newly disclosed vulnerability in the RustFS Console has been classified as a critical stored XSS … RustFS Console XSS Flaw Exposes Admin S3 Credentials in Critical AttackRead more
Pentagon Designates Claude AI a National Security Risk as Federal Ban Begins
In an unprecedented move, the U.S. government has officially designated Anthropic, the creator of Claude AI, … Pentagon Designates Claude AI a National Security Risk as Federal Ban BeginsRead more
Metasploit Exploit Modules: Feb 2026 RCE & Evasion Update
Metasploit exploit modules just received a major February 2026 update that materially changes how red and … Metasploit Exploit Modules: Feb 2026 RCE & Evasion UpdateRead more
Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against Enterprises
In late 2025 and early 2026, security researchers began observing a surge in double‑extortion ransomware attacks … Steaelite RAT and the Rise of Double-Extortion Cyberattacks Against EnterprisesRead more
ResidentBat Android Malware Enables Belarusian KGB Mobile Surveillance
Mobile devices are essential tools for communication and activism—but in repressive environments, they can become instruments … ResidentBat Android Malware Enables Belarusian KGB Mobile SurveillanceRead more
Critical ServiceNow AI Platform Vulnerability Enables Remote Code Execution
Enterprise automation platforms are critical for streamlining workflows, but they can also become targets for attackers. … Critical ServiceNow AI Platform Vulnerability Enables Remote Code ExecutionRead more