Nation-state cyber operations increasingly blur the line between espionage, psychological manipulation, and digital repression. A newly … Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOsRead more
Metasploit Framework Update Exposes Critical RCE Risks in Enterprise Apps
In modern enterprise environments, attackers no longer rely on single vulnerabilities—they chain them. That reality is … Metasploit Framework Update Exposes Critical RCE Risks in Enterprise AppsRead more
LLMjacking Exposed: How Attackers Hijack and Monetize AI Endpoints
Large Language Models (LLMs) are rapidly becoming core enterprise infrastructure—but attackers are already exploiting the weakest … LLMjacking Exposed: How Attackers Hijack and Monetize AI EndpointsRead more
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
200+ Magento Sites Compromised via Critical SessionReaper Vulnerability
E-commerce platforms are lucrative targets for cybercriminals, and recent attacks against Magento Commerce highlight this risk … 200+ Magento Sites Compromised via Critical SessionReaper VulnerabilityRead more
Former Google Engineer Convicted for Stealing AI Trade Secrets for China
In a case highlighting the growing risks of economic espionage in AI, a federal jury recently … Former Google Engineer Convicted for Stealing AI Trade Secrets for ChinaRead more
175K Exposed Ollama Hosts Pose Severe Remote Code Execution Risks
Imagine a network of 175,000 AI servers, scattered across 130 countries, operating without security guardrails. Over … 175K Exposed Ollama Hosts Pose Severe Remote Code Execution RisksRead more
GhostChat Spyware: How a Fake Dating App Spies on You
Mobile devices have become the most personal—and most vulnerable—computing platforms in modern organizations. From private conversations … GhostChat Spyware: How a Fake Dating App Spies on YouRead more
PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747
Machine learning pipelines increasingly power production-critical systems—from fraud detection and recommendation engines to autonomous systems and … PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747Read more
Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look Explained
For years, security teams have relied on Microsoft 365 Unified Audit Logs as a foundational control … Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look ExplainedRead more