$ page 31/35

Ai flaws in Amazon Bedrock, LangSmith, and SGLang expose a DNS exfiltration blind spot

BeyondTrust’s reported DNS exfiltration technique shows how AI code sandboxes can leak secrets and support command channels.

9 min readMar 20

Google adds 24-hour wait for unverified app sideloading to reduce malware and scams

Google’s new 24-hour delay for unverified Android sideloading aims to disrupt scam-driven installs, but it also adds friction for legitimate developer

8 min readMar 20

Claudy Day trio of flaws exposes Claude users to data theft

A reported Claude attack chain shows how prompt injection and weak tool controls can turn a simple web search into enterprise data theft.

9 min readMar 20

Police Scotland fined after sharing victim’s phone data

Police Scotland was fined after sharing a victim’s full phone contents with her alleged attacker, exposing major failures in digital evidence handling

9 min readMar 20

Europe sanctions Chinese and Iranian firms for cyberattacks

The EU has sanctioned Chinese and Iranian entities over cyberattacks on critical infrastructure, signaling a harder line on state-linked operations.

8 min readMar 20

GlassWorm hits 400+ code repos across GitHub, npm, VS Code, and OpenVSX

GlassWorm’s latest supply-chain campaign reportedly hit 400+ GitHub, npm, VS Code, and OpenVSX artifacts, raising major risks for developers.

8 min readMar 20

Ransomware gang exploits Cisco flaw in zero-day attacks since January

Interlock’s abuse of a critical Cisco Secure FMC zero-day shows why firewall management platforms have become prime ransomware targets.

7 min readMar 20

Uk ICO launches investigation into X over AI-generated non-consensual sexual imagery

The UK ICO’s X probe shows AI-generated sexual abuse is becoming a privacy enforcement issue, not just a moderation problem.

9 min readMar 20

Ice agent doxxing site hit by DDoS traffic routed through Russian servers

A reported DDoS against an ICE doxxing-linked site shows how breach fallout can escalate into harassment, outages, and weakly attributed cyber conflic

9 min readMar 20

More attackers are logging in, not breaking in

Credential theft is rising as infostealers, session hijacking, and AI-assisted phishing let attackers log in quietly instead of exploiting systems.

9 min readMar 20

Cisco firewall vulnerability exploited as zero-day in Interlock ransomware attacks

Amazon says a Cisco FMC flaw was exploited as a zero-day in Interlock ransomware attacks, putting firewall management systems at high risk.

8 min readMar 20

Fake PoCs, misunderstood risks cause Cisco SD-WAN chaos

Fake exploit claims muddied the real risk of Cisco SD-WAN flaws, but exposed management systems still pose serious enterprise danger.

7 min readMar 20