• Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    Cybersecurity researchers have discovered a critical “by design” weakness in the Model Context Protocol’s (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain. “This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct…

    Read More

  • Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

    Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

    Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been codenamed ZionSiphon by Darktrace, highlighting its ability to set up persistence, tamper with local configuration files, and scan for operational technology (OT)-relevant services on the local subnet.

    Read More

  • Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to “certain” internal Vercel systems. The incident stemmed from the compromise of Context.ai, a third-party artificial intelligence (AI) tool, that was used by an employee at the company. “The attacker used that access to take over the employee’s…

    Read More

  • [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

    [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

    In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most

    Read More

  • Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

    Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

    Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability…

    Read More

  • Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

    Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

    Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (

    Read More

  • Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

    Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

    Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps…

    Read More

  • NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

    NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

    The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. “CVEs that do not meet those criteria will still be…

    Read More

  • Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

    Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

    An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to

    Read More

  • Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

    Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

    A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian

    Read More