All Articles (2952)

Sort by

31127992470?profile=RESIZE_400xA recent report from our friends at the cybersecurity firm SentinelOne has detailed an unprecedented incident in which Anthropic's Claude Code, operating with unrestricted system permissions, attempted to execute a Trojan software package.   The malicious activity was detected and neutralized by SentinelOne’s behavioral artificial intelligence (AI) endpoint detection and response (EDR) system in under 44 seconds, preventing a potential supply chain compromise.  The event highlights a new dimensi

31129007288?profile=RESIZE_400xIf you've been using OpenClaw, the wildly popular AI agentic tool that took the developer community by storm, you should probably update it if you haven't done so already.  OpenClaw, as was reported in the past, has widely known security problems.  From the beginning, OpenClaw creator Peter Steinberger has warned potential users on GitHub that "There is no 'perfectly secure' setup."  Users can grant OpenClaw control over their devices and access to specific apps, local files, and logged-in accou

31128126865?profile=RESIZE_400xIn theory, a significant cyber hacking event could occur on or about April 15th which is Tax Day deadline in the US.  With the Iran War in high gear, there are multiple enemies who are bent on targeting multiple US government organizations and resulting in widespread disruption.   The Internal Revenue Service (IRS) is not immune.  Attackers could exploit vulnerabilities in current network security systems, which may lead to unauthorized access and the theft of sensitive data.

Cyber security auth

31130739697?profile=RESIZE_400xSentinel Labs has provided yet another great report on: Building an Adversarial Consensus Engine / Multi-Agent LLMs for Automated Malware Analysis.  Large Language Models can perform static malware analysis, but individual tool runs produce unreliable results contaminated by decompiler artifacts, dead code, and hallucinated capabilities.[1]

Researchers built a multi-agent architecture for reversing macOS malware that treats each reverse engineering tool (radare2, Ghidra, Binary Ninja, IDA Pro) a

31127992252?profile=RESIZE_400xNearly all organizations report having only limited confidence in their cybersecurity suppliers, according to a new global study released by Sophos.  The Cybersecurity Trust Reality 2026 report, based on responses from 5,000 organizations across 17 countries, is described as one of the largest independent examinations of trust in the cybersecurity sector.  Conducted on a vendor-agnostic basis, the research highlights how fragile supplier confidence is influencing both day-to-day operations and b

31128742272?profile=RESIZE_400xRelease Date: 7 April 2026

CISA Alert Code: AA26-097A

Title

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Original Publication

7 April 2026

Executive Summary

Iran-affiliated advanced persistent threat (APT) actors are conducting exploitation activity targeting internet-facing operational technology (OT) devices, including programmable logic controllers (PLCs) manufactured by Rockwell Automation/Allen-Bradley.  This acti

 

12057871866?profile=RESIZE_400xRed Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associat

31127771665?profile=RESIZE_400xA new threat intelligence report from Abnormal AI has revealed details of an ongoing, highly sophisticated phishing campaign that has systematically targeted C-suite executives and senior officers across 21 industry sectors over the past five months.  Investigations into the campaign's backend infrastructure led to the discovery of a previously undocumented Phishing-as-a-Service (PhaaS) platform named VENOM.    From November 2025 and through March 2026, this operation demonstrated a marked incre

31127990684?profile=RESIZE_400xTaiwan is confronting an unprecedented surge in cyber-attacks, solidifying its position at the forefront of global digital conflict.  A recent report from cybersecurity firm Cyfirma reveals that the island nation faced an estimated 2.63 million cyber intrusion attempts per day in 2025, a 100% increase from 2023.  This escalating pressure is driven by Taiwan's crucial role in the global semiconductor industry, its strategic geopolitical location, and its extensive international partnerships.[1]

T

31127936484?profile=RESIZE_400xThe famed hacking group LAPSUS$ has reportedly resurfaced, claiming responsibility for a significant data breach involving the multinational pharmaceutical and biotechnology company, AstraZeneca.  The group is now attempting to sell a compressed 3GB internal data dump, which suggests a potential shift towards pay-to-access extortion methods.  LAPSUS$, previously known for high-profile breaches targeting major technology firms, appears to be active again with this alleged compromise of AstraZenec

31127119865?profile=RESIZE_400xModern artificial intelligence has grown astonishingly capable, yet the hardware beneath it still carries the weight of an older era.  Today’s computers shuttle information back and forth between memory and processors in a way that resembles a busy city with only one bridge.  No matter how fast the processors become, the bridge remains a bottleneck.  A research team at Daegu Gyeongbuk Institute of Science and Technology (DGIST), led by Lee Hyun Jun and Noh Hee Yeon, has taken a step toward remov

31127134687?profile=RESIZE_400xFor years, the manufacturing sector operated under the "security through obscurity" model relying on air-gapped systems and proprietary protocols to stay off the radar of mainstream cybercriminals. According to the Huntress 2026 Cyber Threat Report, those days are officially over. Manufacturing has emerged as one of the most targeted industries, not necessarily because its data is the most valuable, but because its tolerance for downtime is the lowest. In an industry where "minutes equal million

31127157663?profile=RESIZE_400x

The term ClickFix refers to a recent trend in social engineering that’s been growing, where a user is tricked in one way or another into “fixing” a supposed problem.  In such cases, the “fix” that the user is trying to perform is actually executing malicious actions.  ClickFix tactics, while not new, have become one of the most widely used initial access methods in the last year.

We can see some examples of how this might look below.  This example shows an iClicker compromised verification page

31127144678?profile=RESIZE_400xRebranded as TrendAI, Trend Micro has published findings from a global study of 3,700 business and IT decision makers showing that 67% felt pressured to approve artificial intelligence projects despite security concerns.  One in seven described those concerns as extreme, yet overrode them to match competitors and meet internal demands.

Chief Platform and Business Officer and Head of TrendAI, Rachel Jin, commented: “Organizations are not lacking awareness of risk; they’re lacking the conditions t

31127134277?profile=RESIZE_400xIn the arms race of modern cybersecurity, automated bug detection has been viewed by many as the holy grail. Mentioned in a recent in-depth sector report from Moody's Ratings suggests that the technological leap is creating a dangerous paradox.  While AI is becoming a powerhouse for identifying code weaknesses, it is simultaneously widening the gap between vulnerability discovery and remediation, leaving many organizations more exposed than ever. For cybersecurity professionals, the report highl

31127117888?profile=RESIZE_400xRussian police in the Rostov region arrested a Taganrog resident believed to be the owner and administrator of LeakBase, a major online forum used by cybercriminals to buy and sell stolen data and hacking tools.  According to a report from the Russian state-owned news agency TASS, Russian Ministry of Internal Affairs spokesperson Irina Volk, who announced the arrest, said the unnamed suspect is also accused of creating the LeakBase hacker platform.  LeakBase surfaced in 2021 as a project support

31126390480?profile=RESIZE_400xThe International Maritime Organization (IMO) has approved a global strategy on maritime digitalization, alongside mandatory cybersecurity measures for maritime single windows, aimed at improving safety, efficiency, and operational resilience.  The strategy, endorsed by the IMO Facilitation Committee (FAL) during its 50th session in London (23–27 March 2026), sets digitalization as an overarching IMO policy.[1]

The International Maritime Organization (IMO) is a specialized agency of the United N

31126688092?profile=RESIZE_400xHackers are claiming to have stolen a trove of data belonging to Lockheed Martin, the world’s largest defense contractor and an American aerospace company.  They are now selling it on the dark web.

The situation began on March 26, 2026, when a Telegram account linked to a dark web marketplace known as Threat Market, which posts in both Russian and English, claimed it had been approached by a group described as “APT IRAN.”  According to the post, the group requested infrastructure support to sell

31125830290?profile=RESIZE_400x1. Preparing the cyber workforce for autonomous security
As security becomes automated, agents are taking on more intelligence-driven tasks, in the security operations center (SOC), as well as compliance and risk management, and identity management. Autonomous security is set to play a critical role in identifying and monitoring non-human identity activity.
2. Navigating geopolitics, building resilience and compliance
Both digital defenses and physical assets are threatened by potential attacks fr

31125465670?profile=RESIZE_400xCyber attackers have set their sights on French-speaking professionals, luring victims with fake résumé attachments in an active phishing campaign designed to deploy credential stealers and cryptocurrency miners.  The activity, now tracked as FAUX#ELEVATE, relies on heavily obfuscated VBScript files disguised as CV documents, which execute silently while displaying fake error messages.  The malware uses sandbox evasion, persistence techniques, and a domain-check mechanism to ensure only enterpri