News
9th March – Threat Intelligence Report
2+ hour, 1+ min ago (473+ words) For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a cyberattack affecting one of its United States sites. The…...
2nd March – Threat Intelligence Report
1+ week, 2+ hour ago (569+ words) For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a United States-based casino and hotel operator, has confirmed that employee data was accessed following an…...
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
1+ week, 5+ day ago (1612+ words) By Aviv Donenfeld and Oded Vanunu Claude Code, Anthropic's AI-powered command-line development tool, represents a significant target in this landscape. As a leading agentic tool within the developer ecosystem, its adoption by technology professionals and integration into enterprise workflows means…...
23rd February – Threat Intelligence Report
2+ week, 10+ hour ago (504+ words) For the latest discoveries in cyber research for the week of 23rd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES France's Ministry of Economy has disclosed a data breach resulted from an unauthorized access to the national bank…...
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
2+ week, 6+ day ago (829+ words) We then connect the technique to the broader trajectory: once AI services can be used as a stealthy transport layer, the same interface can also carry prompts and model outputs that act as an external decision engine, a stepping stone…...
16th February – Threat Intelligence Report
3+ week, 1+ hour ago (499+ words) For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider Odido was hit by a data breach following unauthorized access to its customer management system....
9th February – Threat Intelligence Report
1+ mon, 6+ hour ago (809+ words) For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romania's national oil pipeline operator, Conpet, has suffered a cyberattack that disrupted its IT systems and took its…...
2nd February – Threat Intelligence Report
1+ mon, 1+ week ago (532+ words) For the latest discoveries in cyber research for the week of 2nd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES MicroWorld Technologies, maker of eScan antivirus, has suffered a supply-chain compromise. Malicious updates were pushed via the legitimate…...
VoidLink: The Cloud-Native Malware Framework
1+ mon, 3+ week ago (775+ words) The framework's intended use remains unclear, and as of this writing, no evidence of real-world infections has been observed. The way it is built suggests it may ultimately be positioned for commercial use, either as a product offering or as…...
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
2+ mon, 2+ day ago (1659+ words) The malicious toolkit is usually split into two parts. The first is an IRC bot that enables remote control of the compromised host, including command execution and updates. The second is a bruteforcer that is fetched later and used to…...