Cybersecurity

Iranian Hackers Target Iraqi Officials via Custom Malware

A suspected Iran-nexus threat actor, tracked as Dust Specter, impersonated Iraq’s Ministry of Foreign Affairs to target government officials with new malware.The campaign deployed...

Tycoon 2FA Phishing-As-A-Service Shut Down

Law enforcement dismantled Tycoon 2FA, a major Phishing-as-a-Service platform used in tens of thousands of credential theft attacks.The kit enabled threat actors to steal...

New RFP Guide for AI Governance & Usage Control

Security leaders have new budgets for AI security but often lack clear requirements for governance solutions.Many existing security tools fail to properly monitor AI...

China-Linked AI Tool CyberStrikeAI Used in Global Attacks

The AI-powered attacks on Fortinet FortiGate appliances were executed using the open-source platform CyberStrikeAI.A Chinese developer with potential state ties, known as Ed1s0nZ, created...

Starkiller Phishing Kit Bypasses MFA via Live Proxies

A new phishing kit called Starkiller uses live proxying of legitimate login pages to bypass multi-factor authentication (MFA) effectively.Separate campaigns are evolving to target...

Google API Keys Expose Gemini, Data, Bills

Google Cloud API keys embedded in public website code can be abused to authenticate to Gemini AI endpoints.Researchers found nearly 3,000 exposed keys and...

US AI Firm Clashes With Pentagon Over Military Use

The U.S. Department of Defense has designated AI firm Anthropic as a national security supply chain risk.The conflict stems from Anthropic's refusal to allow...

Latest news

Original Penguin files lawsuit against Pudgy Penguins

PEI Licensing, owner of Original Penguin, filed a trademark lawsuit against the Pudgy Penguins NFT project on Wednesday in...

BRICS Energy Agenda Under Pressure as Hormuz Crisis Fuels Oil Spike

The Strait of Hormuz closure has pushed global oil prices to a 19.5-month high, severely disrupting BRICS oil flows.China...

Solv Protocol Loses $2.7M in Exploit; Offers Bounty

Solv Protocol, a Bitcoin DeFi platform, was exploited for $2.7 million on Thursday.The attacker, who exploited a smart contract...

Must read