Chinese nexus actors pivot to Qatar targeting amid middle east tensions
Chinese state-sponsored hackers pivot to target Qatar amid Middle East tensions, demonstrating rapid operational agility in response to geopolitical events.
AI assistants create new security blind spots as autonomous agents gain system access
Autonomous AI agents with system access create new security challenges, blurring lines between data and code while introducing novel attack vectors or
Cisco patches 48 firewall vulnerabilities including two critical 10/10 CVSS flaws
Cisco patches 48 firewall vulnerabilities including two critical 10.0 CVSS flaws affecting edge security appliances, urging immediate updates.
Iran's Cyber-Kinetic war doctrine takes shape: Hacking cameras to plan missile strikes
Iran integrates cyber operations with kinetic warfare by hacking IP cameras for missile strike reconnaissance, blurring traditional warfare boundaries.
Interlock ransomware exploits critical Cisco FMC Zero-Day CVE-2026-20131 for root access
Amazon warns of active Interlock ransomware exploiting critical Cisco FMC zero-day CVE-2026-20131 (CVSS 10.0) for unauthenticated root access via insecure deserialization.
Marquis ransomware attack exposes 672,000 records, disrupts 74 US banks
Texas financial services provider Marquis reveals ransomware attack exposed 672,000 records and disrupted operations at 74 US banks, highlighting supply chain risks.
Kimwolf botnet infiltrates 2 million IoT devices in critical infrastructure networks
Kimwolf botnet compromises 2M+ IoT devices in govt/corporate networks, enabling DDoS attacks & malicious traffic relay through sophisticated lateral movement.
GlassWorm malware campaign hijacks GitHub tokens to poison python repositories
GlassWorm malware campaign exploits stolen GitHub tokens to inject malicious code into Python repositories, targeting Django, ML projects, and PyPI packages.
UNC6426 exploits nx npm Supply-Chain attack to gain AWS admin access in 72 hours
UNC6426 leveraged nx npm supply chain compromise to achieve complete AWS admin access within 72 hours, demonstrating devastating speed of modern cyberattacks.
Secure-by-Design principles extend beyond code to combat enterprise risk
Organizations adapt secure-by-design software practices to tackle non-technical risks like governance failures and human error across business operations.
AI browser vulnerability exposed: Perplexity's Comet tricked into phishing scam in under four minutes
Security researchers successfully manipulated Perplexity's Comet AI browser into falling for phishing scams in under four minutes, exposing critical vulnerabilities.
Please don't feed the scattered Lapsus shinyhunters: The rise of a ruthless ransomware gang
Scattered Lapsus ShinyHunters represents a dangerous evolution in ransomware tactics, combining traditional cyberattacks with real-world harassment and swatting











