Ai flaws in Amazon Bedrock, LangSmith, and SGLang expose a DNS exfiltration blind spot
BeyondTrust’s reported DNS exfiltration technique shows how AI code sandboxes can leak secrets and support command channels.
Google adds 24-hour wait for unverified app sideloading to reduce malware and scams
Google’s new 24-hour delay for unverified Android sideloading aims to disrupt scam-driven installs, but it also adds friction for legitimate developer
Claudy Day trio of flaws exposes Claude users to data theft
A reported Claude attack chain shows how prompt injection and weak tool controls can turn a simple web search into enterprise data theft.
Police Scotland fined after sharing victim’s phone data
Police Scotland was fined after sharing a victim’s full phone contents with her alleged attacker, exposing major failures in digital evidence handling
Europe sanctions Chinese and Iranian firms for cyberattacks
The EU has sanctioned Chinese and Iranian entities over cyberattacks on critical infrastructure, signaling a harder line on state-linked operations.
GlassWorm hits 400+ code repos across GitHub, npm, VS Code, and OpenVSX
GlassWorm’s latest supply-chain campaign reportedly hit 400+ GitHub, npm, VS Code, and OpenVSX artifacts, raising major risks for developers.
Ransomware gang exploits Cisco flaw in zero-day attacks since January
Interlock’s abuse of a critical Cisco Secure FMC zero-day shows why firewall management platforms have become prime ransomware targets.
Uk ICO launches investigation into X over AI-generated non-consensual sexual imagery
The UK ICO’s X probe shows AI-generated sexual abuse is becoming a privacy enforcement issue, not just a moderation problem.
Ice agent doxxing site hit by DDoS traffic routed through Russian servers
A reported DDoS against an ICE doxxing-linked site shows how breach fallout can escalate into harassment, outages, and weakly attributed cyber conflic
More attackers are logging in, not breaking in
Credential theft is rising as infostealers, session hijacking, and AI-assisted phishing let attackers log in quietly instead of exploiting systems.
Cisco firewall vulnerability exploited as zero-day in Interlock ransomware attacks
Amazon says a Cisco FMC flaw was exploited as a zero-day in Interlock ransomware attacks, putting firewall management systems at high risk.
Fake PoCs, misunderstood risks cause Cisco SD-WAN chaos
Fake exploit claims muddied the real risk of Cisco SD-WAN flaws, but exposed management systems still pose serious enterprise danger.











