E-commerce platforms are lucrative targets for cybercriminals, and recent attacks against Magento Commerce highlight this risk … 200+ Magento Sites Compromised via Critical SessionReaper VulnerabilityRead more
Former Google Engineer Convicted for Stealing AI Trade Secrets for China
In a case highlighting the growing risks of economic espionage in AI, a federal jury recently … Former Google Engineer Convicted for Stealing AI Trade Secrets for ChinaRead more
175K Exposed Ollama Hosts Pose Severe Remote Code Execution Risks
Imagine a network of 175,000 AI servers, scattered across 130 countries, operating without security guardrails. Over … 175K Exposed Ollama Hosts Pose Severe Remote Code Execution RisksRead more
GhostChat Spyware: How a Fake Dating App Spies on You
Mobile devices have become the most personal—and most vulnerable—computing platforms in modern organizations. From private conversations … GhostChat Spyware: How a Fake Dating App Spies on YouRead more
PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747
Machine learning pipelines increasingly power production-critical systems—from fraud detection and recommendation engines to autonomous systems and … PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747Read more
Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look Explained
For years, security teams have relied on Microsoft 365 Unified Audit Logs as a foundational control … Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look ExplainedRead more
Critical Fortinet Authentication Bypass Exploited in 2026
In early 2026, the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert that sent … Critical Fortinet Authentication Bypass Exploited in 2026Read more
Urgent NVIDIA Nsight Graphics Vulnerability Allows Hackers Access
Developer workstations and performance analysis tools are often treated as trusted internal assets—but attackers increasingly view … Urgent NVIDIA Nsight Graphics Vulnerability Allows Hackers AccessRead more
GitLab Security Vulnerabilities Expose 2FA Bypass and DoS Risks
In modern DevSecOps environments, GitLab often sits at the heart of the software supply chain—managing source … GitLab Security Vulnerabilities Expose 2FA Bypass and DoS RisksRead more
Discord Clipboard Hijacker Stealing Crypto via Social Engineering
In late 2025, threat intelligence teams uncovered a Discord clipboard hijacker campaign that quietly drained cryptocurrency … Discord Clipboard Hijacker Stealing Crypto via Social EngineeringRead more