[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
Learn to secure agentic AI workflows and prevent code execution attacks from compromised MCPs, shadow API…
PLUGGYAPE Malware Targets Ukrainian Defense Forces via Signal and WhatsApp
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp.
AI Agents Bypass Authorization: Enterprise Security Risks
Enterprise AI agents are automating tasks but may bypass access controls, granting users unauthorized data access.…
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
Lumen Technologies null-routed traffic to over 550 C2 nodes associated with the AISURU/Kimwolf botnet. The botnet…
Microsoft Disrupts RedVDS Cybercrime Service Used for Online Fraud
Microsoft shuts down RedVDS, a crimeware service used for phishing and BEC fraud, linked to $40M…
Reprompt Attack: Single-Click Data Exfiltration from Microsoft Copilot
Researchers reveal Reprompt attack enabling single-click data exfiltration from Microsoft Copilot via indirect prompt injection. Microsoft…
LOTUSLITE Backdoor Targets U.S. Policy Entities via Spear Phishing
China-linked attackers used Venezuela-themed phishing to deploy the LOTUSLITE backdoor targeting U.S. policy entities using DLL…
Your Digital Footprint Can Lead Right to Your Front Door
Exposed personal data on broker sites fuels scams, stalking, and identity theft; removal tools reduce online…
Drones to Diplomas: Russia’s University Linked to $25M Essay Mill
A Russian university linked to a $25M essay mill is building drones for the war in…
Who Benefited from the Aisuru and Kimwolf Botnets?
An investigation into who profited from the Kimwolf and Aisuru botnets, which compromised millions of Android…





