[Webinar] Securing Agentic AI: MCPs, Tool Access, and Shadow API Key Sprawl
Learn to secure Agentic AI workflows, MCPs, and prevent code execution attacks from trusted automation. Webinar…
PLUGGYAPE Malware Targets Ukrainian Defense Forces via Signal and WhatsApp
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links…
AI Agents: New Authorization Bypass Paths in Enterprise Security
Enterprise AI agents boost automation but often run with broad permissions, allowing actions beyond user access…
Researchers Null-Route Kimwolf and Aisuru Botnet Command Servers
Lumen Technologies null-routed traffic to 550+ Kimwolf/AISURU botnet C2 nodes. These botnets use compromised Android devices…
Microsoft Disrupts RedVDS Cybercrime Infrastructure Fueling Online Fraud
Microsoft and UK authorities disrupted RedVDS, a crimeware service linked to $40M in US fraud and…
4 Outdated Habits Destroying Your SOC’s MTTR in 2026
Leading SOCs reduce MTTR and MTTD by using automated, behavior-based analysis instead of manual reviews and…
Researchers Uncover Reprompt Attack for Data Exfiltration from Microsoft Copilot
New Reprompt attack allows single-click data exfiltration from Microsoft Copilot via indirect prompt injection. Fixed by…
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Cisco releases fixes for CVE-2025-20393, a zero-day RCE flaw in AsyncOS exploited by a China-linked APT…
Drones to Diplomas: Russia University Linked to $25M Essay Mill
Krebs exposes a $25M essay mill tied to a Kremlin-linked oligarch whose university builds drones for…
Kimwolf Botnet Stalking Local Networks: A Security Advisory
A new botnet, Kimwolf, infects millions of devices, using residential proxies to tunnel into local networks.…





