• Manual Processes Are Putting National Security at Risk

    Manual Processes Are Putting National Security at Risk

    Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This should alarm every defense and government leader because manual handling of sensitive data is not just inefficient, it is…

    Read More

  • Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

    Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

    A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guilty to two counts of theft of trade secrets in October…

    Read More

  • SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

    SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

    SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below – CVE-2025-40538 – A broken access control vulnerability that allows an attacker to create a system…

    Read More

  • CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

    CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute

    Read More

  • RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. “Attackers can craft hidden instructions inside a

    Read More

  • UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

    UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

    A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor’s targeting beyond Ukraine and into entities supporting the war-torn nation. The activity, which targeted an unnamed entity involved in regional

    Read More

  • Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

    Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

    Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of…

    Read More

  • UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

    UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

    The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. “The group used several

    Read More

  • Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models. The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms

    Read More

  • APT28 Targeted European Entities Using Webhook-Based Macro Malware

    APT28 Targeted European Entities Using Webhook-Based Macro Malware

    The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo’s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. “The campaign relies on basic tooling and the exploitation…

    Read More