Modern browsers have become one of the largest attack surfaces in enterprise environments—and attackers know it. … Chrome Security Update Fixes 26 RCE VulnerabilitiesRead more
RondoDox Botnet Deploys 174 Exploits Using Home IPs
The RondoDox botnet has rapidly evolved into one of the most concerning emerging threats of the … RondoDox Botnet Deploys 174 Exploits Using Home IPsRead more
Critical CamelClone Spies via File‑Sharing and Rclone
A sophisticated espionage operation tracked as Operation CamelClone is actively targeting government, defense, and diplomatic organizations … Critical CamelClone Spies via File‑Sharing and RcloneRead more
Handala Launches Severe RDP & Wiper Attacks Globally
An Iranian state‑aligned threat actor known as Handala Hack has conducted a series of high‑impact destructive … Handala Launches Severe RDP & Wiper Attacks GloballyRead more
Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped
Stryker Corporation—one of the world’s largest medical technology companies—confirmed on March 11, 2026, that it suffered … Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices WipedRead more
Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE Vulnerability
Microsoft is taking decisive action to address a critical remote code execution (RCE) vulnerability—tracked as CVE‑2026‑0386—affecting … Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE VulnerabilityRead more
Attackers Abuse Microsoft Teams and Quick Assist to Deploy Stealthy A0 Backdoor
Attackers Abuse Microsoft Teams and Quick Assist to Deploy Stealthy A0Backdoor A sophisticated social‑engineering campaign is … Attackers Abuse Microsoft Teams and Quick Assist to Deploy Stealthy A0 BackdoorRead more
OpenClaw AI Agents Exposed to Indirect Prompt Injection, Enabling Silent Data Exfiltration
A newly uncovered class of vulnerabilities in OpenClaw autonomous AI agents demonstrates how attackers can weaponize … OpenClaw AI Agents Exposed to Indirect Prompt Injection, Enabling Silent Data ExfiltrationRead more
Critical LeakyLooker Flaws Expose Google Cloud Data
A newly disclosed set of nine cross‑tenant vulnerabilities in Google Looker Studio, collectively named “LeakyLooker,” exposed … Critical LeakyLooker Flaws Expose Google Cloud DataRead more
FortiGate Firewalls Exploited in Widespread Attacks to Breach Networks and Steal Credentials
LangSmith, the AI observability platform behind many enterprise LLM stacks, ingests over one billion events per … FortiGate Firewalls Exploited in Widespread Attacks to Breach Networks and Steal CredentialsRead more