#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-10891, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking CVE-2026-28561 | gVectors wpForo Forum up to 2.4.15 cross site… with 5 mentions, along with emerging details on Aeternum botnet hides commands in Polygon smart contracts, CVE-2026-3413 | itsourcecode University Management System 1.0…, and Promoting AI Security — Acting Assistant Privacy Commissioner…. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. CVE-2025-10891 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 19 - Integer overflow in V8 in Google Chrome prior to 140. Get the details →
2. CVE-2026-28561 | gVectors wpForo Forum up to 2.4.15 cross site scripting (EUVD-2026-9110) Mentioned across 5 industry sources this week. A vulnerability marked as problematic has been reported in gVectors wpForo Forum up to 2. Get the details →
3. CVE-2026-3413 | itsourcecode University Management System 1.0 admin_single_student.php ID sql injection Mentioned across 3 industry sources this week. A vulnerability, which was classified as critical , has been found in itsourcecode University Management System 1. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Aeternum botnet hides commands in Polygon smart contracts Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to. Referenced in 4 stories this week. Explore →
2. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
3. Trump administration bans Anthropic, seemingly embraces OpenAI The Trump administration on Friday moved to ban the use of products from artificial intelligence com. Referenced in 2 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (18 mentions)
▼
This week's critical security updates and vulnerability disclosures:
2. Aeternum botnet hides commands in Polygon smart contracts (4 mentions)
▼
Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to detect and disrupt. Qrator Labs researchers uncovered Aeternum, a botnet that runs its command-and-control infrastructure through smart contracts ...
Read Full Article →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
▼
4. Lazarus Group Picks a New Poison: Medusa Ransomware (3 mentions)
▼
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
Read Full Article →
5. Trump administration bans Anthropic, seemingly embraces OpenAI (2 mentions)
▼
The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their system...
Read Full Article →
6. ManoMano data breach: massive DIY chain incident impacts 38 million customers - here's what we know (2 mentions)
▼
French ecommerce site suffers third-party breach, losing data on millions of customers.
Read Full Article →
7. Notorious ransomware gang allegedly blackmailed by fake FSB officer (2 mentions)
▼
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Read more in my article on the Hot for Securit...
Read Full Article →
8. Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access (2 mentions)
▼
A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2...
Read Full Article →#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 6 |
| Cloud | 4 |
| Cyber Regulatory | 0 |
| Cybersecurity | 123 |
| Security Vendor Blog | 3 |
| Tech | 15 |
| Threat Intel & Vulnerability | 11 |
| Total Articles Scanned | 162 |
#AI & LLM
Scaling Search Relevance: Augmenting App Store Ranking with LLM-Generated Judgments
▼
Large-scale commercial search systems optimize for relevance to drive successful sessions that help users find what they are looking for. To maximize relevance, we leverage two complementary objectives: behavioral relevance (results users tend to click or download) and textual relevance (a result...
Read Full Article →
Closing the Gap Between Text and Speech Understanding in LLMs
▼
Large Language Models (LLMs) can be adapted to extend their text capabilities to speech inputs. However, these speech-adapted LLMs consistently underperform their text-based counterparts—and even cascaded pipelines—on language understanding tasks. We term this shortfall the text-speech understand...
Read Full Article →
From Radiology to Drug Discovery, Survey Reveals AI Is Delivering Clear Return on Investment in Healthcare
▼
AI is accelerating every aspect of healthcare — from radiology and drug discovery to medical device manufacturing and new treatment methods enabled by digital twins of the human body. NVIDIA’s second annual “State of AI in Healthcare and Life Sciences” survey report reveals how the industry is mo...
Read Full Article →
Beyond a Single Extractor: Re-thinking HTML-to-Text Extraction for LLM Pretraining
▼
One of the first pre-processing steps for constructing web-scale LLM pretraining datasets involves extracting text from HTML. Despite the immense diversity of web content, existing open-source datasets predominantly apply a single fixed extractor to all webpages. In this work, we investigate whet...
Read Full Article →
AMUSE: Audio-Visual Benchmark and Alignment Framework for Agentic Multi-Speaker Understanding
▼
Recent multimodal large language models (MLLMs) such as GPT-4o and Qwen3-Omni show strong perception but struggle in multi-speaker, dialogue-centric settings that demand agentic reasoning tracking who speaks, maintaining roles, and grounding events across time. These scenarios are central to mult...
Read Full Article →
Import AI 446: Nuclear LLMs; China’s big AI benchmark; measurement and AI policy
▼
Welcome to Import AI, a newsletter about AI research. Import AI runs on arXiv and feedback from readers. If you’d like to support this, please subscribe. Subscribe now Want to make AI go better? Figure out how to measure it:…One simple policy intervention that works well…Jacob Steinhardt, an AI r...
Read Full Article →#Cloud
Amazon Bedrock announces OpenAI-compatible Projects API
▼
Amazon Bedrock now supports OpenAI-compatible Projects API in the Mantle inference engine in Amazon Bedrock. Amazon Bedrock is a fully managed service that offers a broad selection of best-in-class foundation models from leading AI companies like Anthropic, Meta, and OpenAI, along with a broad se...
Read Full Article →
AWS WAF announces AI activity dashboard for visibility into AI bot and agent traffic
▼
Today, AWS WAF announced a new AI activity dashboard that provides centralized visibility into AI bot and agent traffic reaching your applications. With this launch, AWS WAF Bot Control expands its detection coverage to track more than 650 unique bots and agents, offering one of the most comprehe...
Read Full Article →
The Rise of the AI Security Engineer: A New Discipline for an AI-Native World
▼
As autonomous AI systems transform business, a new profession is emerging to protect them: the AI Security Engineer. Discover why this specialized discipline is becoming a survival imperative for organizations in an AI-native world.
Read Full Article →
Amazon announces generative AI-based artifacts in Amazon Q Developer for visualizing resource and cost data
▼
Today, AWS announces the general availability of Amazon Q Developer artifacts in the AWS Management Console. Amazon Q artifacts is a generative AI-based user experience that enables customers to visualize resource data in tables and cost data in charts. The launch also moves the Q icon to the nav...
Read Full Article →#Cyber Regulatory
#Cybersecurity
Hacker erpressen weniger Lösegeld
▼
immer mehr betroffene Unternehmen und Organisationen folgen dem Rat, kein Lösegeld zu zahlen . fadfebrian – shutterstock.com Laut einem neuen Bericht des Analyseunternehmens Chainalysis konnten Hacker im Jahr 2025 im Zusammenhang mit Ransomware-Angriffen insgesamt 820 Millionen Dollar erbeuten. A...
Read Full Article →
When cyber threats start thinking for themselves
▼
In this Help Net Security video, Jason Rivera, Field CISO & Head of Solution Engineering at SimSpace, discusses how autonomous AI agents are changing cyber threats. Drawing on experience in the US Army, NSA, Deloitte, and CrowdStrike, he describes how security teams have traditionally measured ri...
Read Full Article →
AI risk moves into the security budget spotlight
▼
Enterprises are pushing AI deeper into workflows that touch sensitive data across cloud platforms and SaaS apps. The 2026 Thales Data Threat Report, based on a survey of 3,120 respondents in 20 countries, places that shift alongside growing pressure on data protection, identity controls, and clou...
Read Full Article →
Vulnerability Finding: An Inflection Point
▼
LLM-driven vuln finding has reached an inflection
Read Full Article →
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Appsec Roundup - July 2024
▼
The most important stories around threat modeling, appsec and secure by design for June, 2024.
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Introducing Magic Security Dust!
▼
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
GPT-3
▼
Text captured from GPT-3
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
Threat Modeling and Social Issues
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
Threat Modeling & IoT
▼
[no description provided]
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
Risky Bulletin: LLMs can deanonymize internet users based on their comments
▼
LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.
Read Full Article →
How proactive is your AI in detecting cyber threats
▼
How Do Non-Human Identities Enhance AI Threat Detection? Is your organization leveraging Non-Human Identities (NHIs) to elevate its cybersecurity strategy? Managing NHIs becomes a pivotal factor in ensuring robust cloud security and improving AI threat detection capabilities. Understanding and ma...
Read Full Article →
Who is the Kimwolf Botmaster “Dort”?
▼
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist...
Read Full Article →
Canadian Tire Data Breach Impacts 38 Million Accounts
▼
Names, addresses, email addresses, phone numbers, and encrypted passwords were compromised in the attack. The post Canadian Tire Data Breach Impacts 38 Million Accounts appeared first on SecurityWeek .
Read Full Article →
Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more
▼
Cybercriminal networks resell real travel bookings bought with stolen credit cards.
Read Full Article →
Iran ’s Internet near-totally blacked out amid US, Israeli strikes
▼
Iran experienced a near-total internet blackout as Israel and the U.S. launched strikes, according to NetBlocks. Internet access across Iran was drastically reduced on Saturday as Israel and the United States carried out strikes against the country, according to independent and non-partisan globa...
Read Full Article →
Microsoft warns of RAT delivered through trojanized gaming utilities
▼
Attackers spread trojanized gaming tools to deliver a stealthy RAT using PowerShell, LOLBins, and Defender evasion tactics. Threat actors are tricking users into running trojanized gaming utilities shared through browsers and chat platforms to deploy a remote access trojan. “Microsoft Defender re...
Read Full Article →
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
▼
HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.
Read Full Article →
Europol-led crackdown on The Com hackers leads to 30 arrests
▼
A yearlong Europol-coordinated operation dubbed "Project Compass" has led to 30 arrests and 179 suspects being tied to "The Com," an online cybercrime collective that targets children and teenagers. [...]
Read Full Article →
Watch out - that Google Tasks email could be a scam, and land you in hot water at work
▼
Hackers found a new legitimate tool to abuse, and this time it's Google Tasks.
Read Full Article →
Ransomware payments drop to record low, even as attacks surge
▼
Fewer businesses are paying, but ransomware groups are growing in number.
Read Full Article →
The Case for Why Better Breach Transparency Matters
▼
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.
Read Full Article →
CISA warns that RESURGE malware can be dormant on Ivanti devices
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. [...]
Read Full Article →
38 Million Allegedly Impacted by ManoMano Data Breach
▼
Hackers stole personal information such as names, email addresses, phone numbers, and other information. The post 38 Million Allegedly Impacted by ManoMano Data Breach appeared first on SecurityWeek .
Read Full Article →
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
▼
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks....
Read Full Article →
Phishing Attacks Against People Seeking Programming Jobs
▼
This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article .
Read Full Article →
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
▼
Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience appeared first on SecurityWeek .
Read Full Article →
Europol goes after The Com’s ransomware and extortion networks
▼
Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly teenagers and young adults linked to high-profile ransomware attacks, financial extortion, and the coercion of vulnerable...
Read Full Article →
Your personal OpenClaw agent may also be taking orders from malicious websites
▼
If you thought running an AI agent locally kept it safely inside your machine’s walls, you’re in for a surprise. Researchers at Oasis Security have disclosed a flaw chain that allowed a malicious website to quietly connect to a locally running OpenClaw agent and take full control. The issue stems...
Read Full Article →
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested
▼
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes
Read Full Article →
Juniper Networks PTX Routers Affected by Critical Vulnerability
▼
An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902. The post Juniper Networks PTX Routers Affected by Critical Vulnerability appeared first on SecurityWeek .
Read Full Article →
How to make LLMs a defensive advantage without creating a new attack surface
▼
Large language models (LLMs) have arrived in security in three different forms at once: as productivity tools that sit beside analysts, as components embedded inside products and workflows and as targets that attackers can probe, manipulate and steal. That convergence is why the conversation feel...
Read Full Article →
Hacker kompromittieren immer schneller
▼
Der Einsatz von KI-Tools macht Cyberangriffe nicht nur schneller, sondern erhöht auch die Taktzahl. Color4260 / Shutterstock Crowdstrike hat die aktuelle Ausgabe seines Global Threat Report veröffentlicht – mit mehreren bemerkenswerten Erkenntnissen. So benötigte ein Angreifer im Jahr 2025 im Sch...
Read Full Article →
Risky Bulletin: Russian man extorts Conti ransomware group
▼
A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.
Read Full Article →
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
▼
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
Read Full Article →
Project Compass is Europol’s new playbook for taking on The Com
▼
Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap. The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop .
Read Full Article →
New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain
▼
Qrator Research Lab has identified Aeternum C2, a botnet that uses the Polygon blockchain for commands, making it nearly impossible to shut down.
Read Full Article →
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
▼
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for command-and-control, Aeternum stores ...
Read Full Article →
Trend Micro warns of critical Apex One code execution flaws
▼
Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]
Read Full Article →
European DYI chain ManoMano data breach impacts 38 million customers
▼
DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]
Read Full Article →
Fake Avast Website Targets Users With €499 Phishing Refund Scam
▼
Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.
Read Full Article →
Critical Juniper Networks PTX flaw allows full router takeover
▼
A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges. [...]
Read Full Article →
Google takes down telecom hackers using Sheets and SaaS apps to spread mayhem
▼
A decade-old threat actor is up to some new shenanigans, but Google is having none of it.
Read Full Article →
Olympique Marseille confirms 'attempted' cyberattack after data leak
▼
French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month. [...]
Read Full Article →
Aeternum Botnet Shifts Command Control to Polygon Blockchain
▼
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts
Read Full Article →
Hackers are harnessing AI to exploit security flaws faster than ever
▼
As AI gets integrated, attacks speed up and grow in severity, so buisnesses should shape up.
Read Full Article →
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify
▼
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
Read Full Article →
Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign
▼
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation
Read Full Article →
LLMs Generate Predictable Passwords
▼
LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven for example, L , 9, m, 2, $ and ...
Read Full Article →
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
▼
Google has disrupted a China-linked espionage group that used Google’s spreadsheet application as a covert spy tool to compromise telecom providers and government agencies across 42 countries, sending commands and receiving stolen data through it, Google’s Threat Intelligence Group (GTIG) said on...
Read Full Article →
9 unverzichtbare Open-Source-Security-Tools
▼
Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen – nicht zuletzt weil diese im Regelfall von einer lebendigen und nutzwertigen Com...
Read Full Article →
Srsly Risky Biz: Is Claude too woke for war?
▼
Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and ...
Read Full Article →
Smashing Security podcast #456: How to lose friends and DDoS people
▼
When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with pa...
Read Full Article →
Governments issue warning over Cisco zero-day attacks dating back to 2023
▼
The global campaign marks the second series of multiple actively exploited zero-day vulnerabilities in Cisco edge technology since last spring. The similarities don’t end there. The post Governments issue warning over Cisco zero-day attacks dating back to 2023 appeared first on CyberScoop .
Read Full Article →
RAMP Forum Seizure Fractures Ransomware Ecosystem
▼
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.
Read Full Article →
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
▼
Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting internat...
Read Full Article →
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
▼
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, ...
Read Full Article →
This new cybercrime platform lets hackers run malicious Google Ads and hide from Google's screening process
▼
1Campaign has been around for three years and comes with a fancy dashboard.
Read Full Article →
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
▼
The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief....
Read Full Article →
Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks
▼
Too many defenders and researchers are paying attention to defects and unsubstantiated exploit concepts that aren’t worth their time, VulnCheck’s Caitlin Condon said. The post Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks appeared first on CyberScoop .
Read Full Article →
Across party lines and industry, the verdict is the same: CISA is in trouble
▼
The agency lost a third of its people in a year. Now industry and lawmakers on both sides say it's unprepared for a potential crisis. The post Across party lines and industry, the verdict is the same: CISA is in trouble appeared first on CyberScoop .
Read Full Article →
SolarWinds Serv-U has some critical security flaws, so users should update now or face attack
▼
Four critical flaws were addressed, all of which could lead to remote code execution.
Read Full Article →
Operation Red Card 2.0 Leads to 651 Arrests in Africa
▼
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.
Read Full Article →
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
▼
SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access c...
Read Full Article →
CarGurus data breach affects 12.5 million accounts
▼
Automotive marketplace CarGurus was the target of a data breach in which the names, email addresses, phone numbers, and physical addresses of millions of customers were stolen.
Read Full Article →
Multiple mental health apps riddled with high severity security flaws — data of millions put at risk, so be on your guard
▼
Researchers found 1,500 vulnerabilities in 10 popular apps, including dozens of high-severity flaws.
Read Full Article →
Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack
▼
Fintech giant Marquis is suing its firewall provider SonicWall, claiming that an earlier breach with SonicWall allowed hackers to deploy ransomware on Marquis' network.
Read Full Article →
Top ad tech firm Optimizely hit by data breach - around 10,000 companies possibly affected
▼
Attack points to another breach by ShinyHunters, but the group has not yet claimed responsibility.
Read Full Article →
Multifaceted Phishing Scheme Deceives Bitpanda Customers
▼
Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information
Read Full Article →
Russian hackers target European firms with new spear-phishing cyberattacks
▼
APT28 resurfaces once again, targeting Western organizations with spear-phishing lures.
Read Full Article →
North Korean Lazarus Group Expands Ransomware Activity With Medusa
▼
Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks
Read Full Article →
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
▼
A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting beyond Ukraine and into entities support...
Read Full Article →
Conduent data breach grows, affecting at least 25M people
▼
The number of people affected by a data breach at government contractor giant Conduent is growing, as millions of people continue to receive notices warning them that hackers stole their personal data.
Read Full Article →
NYC transit workers hit by Qilin ransomware - thousands of members possibly affected
▼
Qilin hits the Local 100 of TWA, leaking sensitive member data to the dark web.
Read Full Article →
'Social advertising is being used to defraud at scale across some of the largest platforms.': Nearly one in three Meta ads reportedly point to a scam, phishing or malware
▼
Scam ads create millions of impressions every month, tricking users into downloading malware, and more.
Read Full Article →
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
▼
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said ...
Read Full Article →
CrowdStrike says attackers are moving through networks in under 30 minutes
▼
The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior. The post CrowdStrike says attackers are moving through networks in under 30 minutes appeared first on CyberScoop .
Read Full Article →
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
▼
Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve their own models. The distillation attacks generated over 16 million exchanges wit...
Read Full Article →
Why I Hate Anthropic and You Should Too
▼
[](/images/why-you-should-hate-anthropic.webp) All the best influencers hate Anthropic right now, and for good reason. They ruined everything, and they're worthy of every bit of hate they get. Quick recap: - T...
Read Full Article →
Between Two Nerds: How NSA will use AI
▼
In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI. This episode is available on Youtube.
Read Full Article →
APT28 Targeted European Entities Using Webhook-Based Macro Malware
▼
The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed O...
Read Full Article →
600+ FortiGate Devices Hacked by AI-Armed Amateur
▼
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
Read Full Article →
Major Japanese semiconductor supplier hit by ransomware attack
▼
Advantest confirms being hit by ransomware, but says investigation is currently ongoing.
Read Full Article →
Top Las Vegas hotel is the latest ShinyHunters ransomware victim - hackers demand $1.5 million to not leak data
▼
ShinyHunters claim to have hit Wynn Resorts, stealing 800,000 recors.
Read Full Article →
Russian hacker uses multiple AI tools to break hundreds of firewalls
▼
A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.
Read Full Article →
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
▼
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
Read Full Article →
Leading Semiconductor Supplier Advantest Hit by Ransomware Attack
▼
Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident
Read Full Article →
University of Mississippi Medical Center Still Offline After Ransomware Attack
▼
University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday
Read Full Article →#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
When Uptime Is Non-Negotiable: Rethinking Zero Trust for OT Environments
▼
#Tech
AMD will bring its "Ryzen AI" processors to standard desktop PCs for the first time
▼
First wave of Ryzen AI desktop CPUs targets business PCs rather than DIYers.
Read Full Article →
Trump administration bans Anthropic, seemingly embraces OpenAI
▼
The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their systems. Just hours later, Anthropic rival OpenAI’s CEO,...
Read Full Article →
OpenAI launches stateful AI on AWS, signaling a control plane power shift
▼
Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has ann...
Read Full Article →
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
▼
Credential and cryptocurrency theft, live surveillance, ransomware - an attacker's Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential and cryptocurren...
Read Full Article →
Claude 3 snares itself regular writing gig
▼
Claude Opus 3, which has been replaced by Claude Opus 4.6 as Anthropic’s most powerful AI model, has managed to find a new position. The “newly retired” AI model has launched its own Substack blog, Claude’s Corner , which it is aiming to publish it weekly. Claude set out its purpose in writing th...
Read Full Article →
El Hospital Provincial de Castellón convierte la ciberseguridad en seguridad del paciente
▼
La transformación digital del sector sanitario ha abierto una nueva frontera para la atención médica, pero también para los ciberdelincuentes. Hospitales, centros de salud y laboratorios se han convertido en uno de los objetivos prioritarios de los ataques informáticos por una razón evidente: man...
Read Full Article →
Anthropic to US DoD: No compromise on AI ethics
▼
Faced with demands from the US Department of Defense to allow its technology to be used for purposes the company considers unsafe or antidemocratic, Anthropic CEO Dario Amodei ’s stance remains firm: “We cannot in good conscience accede to their request,” he wrote in a statement published on the ...
Read Full Article →
New IT roles emerge to tackle AI evaluation
▼
New IT jobs are emerging to help organizations better evaluate AI outputs as they move from AI pilots to full-scale deployments. Many organizations are now considering assembling or hiring AI evaluation teams, with some experts calling these recently created roles an essential safety net for comp...
Read Full Article →
Anthropic launches new marketing blog, pretends it's being 'written' by 'retired' LLM
▼
Pretending the software is sentient makes it sound more powerful As with any piece of obsolete software, you might expect an outdated AI model to just be switched off. Anthropic, however, argues that simply pulling the plug has downsides. After “retirement” interviews, Claude Opus 3 said it wante...
Read Full Article →
US orders diplomats to push back on data sovereignty
▼
The US government has ordered its diplomats to actively oppose other countries’ attempts to introduce so-called data sovereignty laws that restrict how and where foreign technology companies can store and handle citizens’ data, according to Reuters . In an internal memo from Secretary of State Ma...
Read Full Article →
Do NOT use AI-generated passwords, security experts warn
▼
Choosing a secure password isn’t always easy. That’s why some people are turning to “artificial intelligence” (e.g., chatbots like ChatGPT and Google Gemini) to create secure passwords for them. But security experts at Irregular warn against this approach. After some tests, they’ve discovered tha...
Read Full Article →
I hate that we need scam protection in ChatGPT. But we do
▼
AI doesn’t always give accurate answers—much less specific. Meanwhile, security software sometimes gets outright ignored. You wouldn’t think combining the two would make for a solid match, but Malwarebytes is proving me wrong. Recently, the venerable security software maker launched a ChatGPT int...
Read Full Article →
Chrome update fixes 3 more high-risk security vulnerabilities
▼
In the new Chrome versions 145.0.7632.116/117 for Windows and macOS and 145.0.7632.116 for Linux, the developers have fixed 3 newly reported security vulnerabilities. According to Google, none of these vulnerabilities are being exploited for attacks in the wild. In the Chrome Releases blog post ,...
Read Full Article →
New phishing hacks aren’t sloppy—they’re personalized
▼
Scams keep coming at us—and they’re getting harder to spot. How? Scammers have begun making them more tailored to their marks. That is… us. Personalized scams, as security experts call them, use details about you in the hope of tricking you more easily. This information comes from illicit sources...
Read Full Article →
Android malware alert: Fake IPTV apps will steal your bank details
▼
A new Android malware called “Massiv” is on the rise. Security researchers at ThreatFabric uncovered the large-scale campaign, in which hackers disguised and distributed the malware as a harmless IPTV streaming app. Once installed, however, the app was able to read screen inputs to steal password...
Read Full Article →#Threat Intel & Vulnerability
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
▼
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
▼
Connecticut Senate Bill Raises the Stakes on Data Breach Response
▼
Hayley Steele and Gregory Szewczyk of Ballard Spahr write: A new bill introduced in Connecticut—Connecticut Senate Bill 117, An Act Concerning Breaches of Security Involving Electronic Personal Information—would create mandatory forensic examination requirements for entities that experience a “ma...
Read Full Article →
Court Refuses to Slice Up CiCi’s Cyber Extortion Coverage
▼
Andrea DeField and S. Alice Weeks of Hunton Andrews Kurth write: In the rarely litigated space of cyber insurance, the Northern District of Texas issued a win for cyber policyholders this week, offering a clear reminder to insurers that if they want to restrict coverage, they must draft the polic...
Read Full Article →
Israel plunges Iran into darkness with largest cyberattack in history during attack against Iran
▼
The Jerusalem Post reports: As fighter jets and cruise missiles struck IRGC command centers, a parallel front reportedly paralyzed the Islamic Republic from within. Reports on Saturday, February 28, 2026, indicated that Iran entered an almost complete digital fog, in what appeared to be a large-s...
Read Full Article →
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
▼
It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
Read Full Article →
Inside a fake Google security check that becomes a browser RAT
▼
Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.
Read Full Article →
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
▼
New Dohdoor malware campaign targets education and health care
▼
Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.”
Read Full Article →
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616
▼
Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges.
Read Full Article →
Refund scam impersonates Avast to harvest credit card details
▼
A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.
Read Full Article →📋 CVE Reference Bulletin (59 vulnerabilities) ▼
⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.
| CVE ID | Severity | Product | Source |
|---|---|---|---|
| CVE-2026-28562 | ⚪ Unknown | EUVD-2026-9111 | VulnDB |
| CVE-2026-28561 | ⚪ Unknown | EUVD-2026-9110 | VulnDB |
| CVE-2026-28560 | ⚪ Unknown | EUVD-2026-9109 | VulnDB |
| CVE-2026-28559 | ⚪ Unknown | EUVD-2026-9108 | VulnDB |
| CVE-2026-28558 | ⚪ Unknown | EUVD-2026-9107 | VulnDB |
| CVE-2026-28557 | ⚪ Unknown | EUVD-2026-9106 | VulnDB |
| CVE-2026-28556 | ⚪ Unknown | EUVD-2026-9105 | VulnDB |
| CVE-2026-28555 | ⚪ Unknown | EUVD-2026-9104 | VulnDB |
| CVE-2026-28554 | ⚪ Unknown | EUVD-2026-9103 | VulnDB |
| CVE-2026-25108 | ⚪ Unknown | Vulnerability | The Hacker News |
| CVE-2026-20127 | ⚪ Unknown | Exploited Since 2023 | The Hacker News |
| CVE-2026-3422 | 🔴 CRITICAL | e-Excellence U-Office | |
| CVE-2026-3413 | ⚪ Unknown | itsourcecode University | |
| CVE-2026-3412 | ⚪ Unknown | itsourcecode University | |
| CVE-2026-3411 | ⚪ Unknown | itsourcecode University | |
| CVE-2026-3410 | ⚪ Unknown | itsourcecode Society | |
| CVE-2026-3409 | 🔵 LOW | eosphoros-ai db-gpt | |
| CVE-2026-3408 | ⚪ Unknown | Issue 2848 | VulnDB |
| CVE-2026-3407 | 🔵 LOW | EUVD-2026-9140 | VulnDB |
| CVE-2026-3406 | ⚪ Unknown | EUVD-2026-9139 | VulnDB |
| CVE-2026-3405 | ⚪ Unknown | EUVD-2026-9138 | VulnDB |
| CVE-2026-3404 | ⚪ Unknown | EUVD-2026-9137 | VulnDB |
| CVE-2026-3403 | ⚪ Unknown | EUVD-2026-9136 | VulnDB |
| CVE-2026-3401 | ⚪ Unknown | EUVD-2026-9134 | VulnDB |
| CVE-2026-3400 | 🔵 LOW | EUVD-2026-9133 | VulnDB |
| CVE-2026-3399 | 🔵 LOW | EUVD-2026-9132 | VulnDB |
| CVE-2026-3398 | 🔵 LOW | EUVD-2026-9131 | VulnDB |
| CVE-2026-3395 | 🔴 CRITICAL | EUVD-2026-9130 | VulnDB |
| CVE-2026-3394 | ⚪ Unknown | Issue 401 / EUVD-2026-9129 | VulnDB |
| CVE-2026-3393 | 🔵 LOW | Issue 401 / EUVD-2026-9128 | VulnDB |
| CVE-2026-3392 | ⚪ Unknown | Issue 384 / EUVD-2026-9127 | VulnDB |
| CVE-2026-3391 | ⚪ Unknown | Issue 383 / EUVD-2026-9126 | VulnDB |
| CVE-2026-3390 | ⚪ Unknown | Issue 382 / EUVD-2026-9125 | VulnDB |
| CVE-2026-3389 | ⚪ Unknown | Issue 314 / EUVD-2026-9124 | VulnDB |
| CVE-2026-3388 | ⚪ Unknown | Issue 312 / EUVD-2026-9123 | VulnDB |
| CVE-2026-3387 | ⚪ Unknown | Issue 1220 / EUVD-2026-9122 | VulnDB |
| CVE-2026-3386 | ⚪ Unknown | EUVD-2026-9121 | VulnDB |
| CVE-2026-3385 | ⚪ Unknown | Issue 1218 / EUVD-2026-9120 | VulnDB |
| CVE-2026-3384 | ⚪ Unknown | Issue 633 / EUVD-2026-9119 | VulnDB |
| CVE-2026-3383 | ⚪ Unknown | Issue 634 / EUVD-2026-9118 | VulnDB |
| CVE-2026-3382 | ⚪ Unknown | Issue 635 / EUVD-2026-9117 | VulnDB |
| CVE-2026-3180 | ⚪ Unknown | Contest Gallery | |
| CVE-2026-3132 | ⚪ Unknown | Master Addons | |
| CVE-2026-3010 | ⚪ Unknown | EUVD-2026-9102 | VulnDB |
| CVE-2026-3000 | ⚪ Unknown | Changing IDExpert | |
| CVE-2026-2999 | ⚪ Unknown | Changing IDExpert | |
| CVE-2026-2844 | ⚪ Unknown | EUVD-2026-9101 | VulnDB |
| CVE-2026-2329 | ⚪ Unknown | Intruder Intel | |
| CVE-2026-1731 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-68613 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-64328 | ⚪ Unknown | exploitation impacts 900 | Security Affair |
| CVE-2025-40554 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-40553 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-40552 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-15598 | ⚪ Unknown | Dataease SQLBot | |
| CVE-2025-15597 | ⚪ Unknown | GHSA-h4xm-3q3p-5g6r | VulnDB |
| CVE-2025-10891 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-7544 | ⚪ Unknown | Intruder Intel | |
| CVE-2024-37032 | ⚪ Unknown | Intruder Intel |
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>