A newly uncovered class of vulnerabilities in OpenClaw autonomous AI agents demonstrates how attackers can weaponize … OpenClaw AI Agents Exposed to Indirect Prompt Injection, Enabling Silent Data ExfiltrationRead more
CyberSecurity
Critical LeakyLooker Flaws Expose Google Cloud Data
A newly disclosed set of nine cross‑tenant vulnerabilities in Google Looker Studio, collectively named “LeakyLooker,” exposed … Critical LeakyLooker Flaws Expose Google Cloud DataRead more
Microsoft Urgently Fixes Critical RRAS Security Flaws
Microsoft has issued an out‑of‑band hotpatch update addressing multiple remote code execution (RCE) vulnerabilities impacting Windows … Microsoft Urgently Fixes Critical RRAS Security FlawsRead more
Meta to Permanently Remove End‑to‑End Encryption Feature in Instagram DMs
Meta has confirmed it will permanently remove end‑to‑end encryption (E2EE) from Instagram direct messages, with support … Meta to Permanently Remove End‑to‑End Encryption Feature in Instagram DMsRead more
Handala Expands Destructive Cyber Operations Beyond Israeli Targets
A surge of destructive wiper attacks is now threatening organizations across both Israel and the United … Handala Expands Destructive Cyber Operations Beyond Israeli TargetsRead more
Loblaw Data Breach: Threat Actor Gains Access to Internal IT Network and Customer Data
Loblaw Companies Limited—Canada’s largest food and pharmacy retailer—has confirmed a data breach affecting portions of its … Loblaw Data Breach: Threat Actor Gains Access to Internal IT Network and Customer DataRead more
LangSmith Vulnerability: CVE‑2026‑25750 and How to Prevent Account Takeover
LangSmith, the AI observability platform behind many enterprise LLM stacks, ingests over one billion events per … LangSmith Vulnerability: CVE‑2026‑25750 and How to Prevent Account TakeoverRead more
WebDAV Malware Delivery: How Hackers Exploit Windows File Explorer
Phishing is no longer confined to the browser. A fast‑growing tactic—WebDAV malware delivery—leverages legacy behavior in … WebDAV Malware Delivery: How Hackers Exploit Windows File ExplorerRead more
ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise Defenses
Phishing has evolved beyond look‑alike domains and typo‑squats. Recent research exposes ARPA TLD phishing, where threat … ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise DefensesRead more
Metasploit Exploit Modules: Feb 2026 RCE & Evasion Update
Metasploit exploit modules just received a major February 2026 update that materially changes how red and … Metasploit Exploit Modules: Feb 2026 RCE & Evasion UpdateRead more