• APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

    APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

    A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai. The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework. “Protection mechanism failure in MSHTML Framework allows an unauthorized

    Read More

  • North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

    North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

    Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead…

    Read More

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

    ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

    OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. “Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly…

    Read More

  • Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

    Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

    New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix “AIza”) embedded in client-side code to provide Google-related…

    Read More

  • Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

    Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

    Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply chain risk.” “This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance…

    Read More

  • DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

    DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

    The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added.…

    Read More

  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

    900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

    The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France.…

    Read More

  • Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

    Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

    Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code that’s responsible for exfiltrating secrets entered via terminal password

    Read More

  • ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

    ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

    The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves…

    Read More

  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

    Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

    Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X.…

    Read More