Large Language Models (LLMs) are rapidly becoming core enterprise infrastructure—but attackers are already exploiting the weakest … LLMjacking Exposed: How Attackers Hijack and Monetize AI EndpointsRead more
incident response
Google Disrupts Massive Residential Proxy Networks Abusing User Devices
Residential proxy networks have quietly become one of the most abused infrastructures in modern cybercrime—and most … Google Disrupts Massive Residential Proxy Networks Abusing User DevicesRead more
175K Exposed Ollama Hosts Pose Severe Remote Code Execution Risks
Imagine a network of 175,000 AI servers, scattered across 130 countries, operating without security guardrails. Over … 175K Exposed Ollama Hosts Pose Severe Remote Code Execution RisksRead more
PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747
Machine learning pipelines increasingly power production-critical systems—from fraud detection and recommendation engines to autonomous systems and … PyTorch RCE Vulnerability Actively Exploited: CVE-2026-24747Read more
Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look Explained
For years, security teams have relied on Microsoft 365 Unified Audit Logs as a foundational control … Microsoft 365 Outlook Add-In Exploit: Exfil Out&Look ExplainedRead more
Critical Fortinet Authentication Bypass Exploited in 2026
In early 2026, the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert that sent … Critical Fortinet Authentication Bypass Exploited in 2026Read more
Discord Clipboard Hijacker Stealing Crypto via Social Engineering
In late 2025, threat intelligence teams uncovered a Discord clipboard hijacker campaign that quietly drained cryptocurrency … Discord Clipboard Hijacker Stealing Crypto via Social EngineeringRead more
Dangerous TP-Link Bug Lets Attackers Seize VIGI Cameras
In early 2026, a major authentication bypass vulnerability surfaced in TP‑Link’s widely deployed VIGI camera series—putting … Dangerous TP-Link Bug Lets Attackers Seize VIGI CamerasRead more
Russian Hacker Group Disrupted by Ukraine Police: Ransomware Operations Exposed
Ransomware continues to be one of the most destructive cyber threats worldwide, costing organizations hundreds of … Russian Hacker Group Disrupted by Ukraine Police: Ransomware Operations ExposedRead more
Malicious File Converter Apps: How Free Tools Infect Systems
In 2024 alone, initial access via trojanized software accounted for a growing share of enterprise malware … Malicious File Converter Apps: How Free Tools Infect SystemsRead more