• Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

    Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

    The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. “Unlike traditional on-premises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key,

    Read More

  • Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

    Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

    Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time. The open-weight language model was released by OpenAI earlier this month. “PromptLock

    Read More

  • Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

    Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

    Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of personal data in July 2025. “The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services, and government, and religious institutions,” the company said. “

    Read More

  • ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

    ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

    A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by…

    Read More

  • The 5 Golden Rules of Safe AI Adoption

    The 5 Golden Rules of Safe AI Adoption

    Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is not the pace of AI adoption, but the lack of control and safeguards in place. For CISOs and security leaders like you, the challenge is clear: you don’t want to slow AI adoption down,…

    Read More

  • Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

    Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

    A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent. The activity, assessed to be opportunistic in nature, has been attributed to a threat actor tracked by Google Threat Intelligence Group and Mandiant, tracked as UNC6395.…

    Read More

  • Bentz promotes Big Beautiful Bill at The Dalles Rotary meeting, attracts protesters

    Bentz promotes Big Beautiful Bill at The Dalles Rotary meeting, attracts protesters

    THE DALLES — Oregon’s 2nd Congressional District Rep. Cliff Bentz attended the Rotary Club of The Dalles meeting at Spooky’s Pizza on Aug. 20, where he focused on aspects of the recently passed Big Beautiful Bill (BBB) that “will help…

    Read More

  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

    Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

    Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in question are listed below – CVE-2025-7775 (CVSS score: 9.2) – Memory overflow vulnerability leading to Remote Code Execution and/or Denial-of-Service CVE-2025-7776 (CVSS score: 8.8) -…

    Read More

  • MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

    MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

    Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. “Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking

    Read More

  • AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

    AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

    Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace,…

    Read More