New Reprompt Attack Silently Siphons Microsoft Copilot Data
A novel reprompt attack is exploiting Microsoft Copilot, enabling attackers to silently exfiltrate sensitive data. Learn…
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
CISA adds Microsoft Office and HPE OneView vulnerabilities to its KEV list, urging agencies to patch…
[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
Learn to secure Agentic AI workflows, MCPs, and API keys. Discover practical controls for development without…
PLUGGYAPE Malware Targets Ukrainian Defense Forces Via Signal, WhatsApp
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp using phishing and…
New Research: 64% of 3rd-Party Apps Access Data Without Justification
Study finds 64% of third-party apps access sensitive data on 4,700 websites without need, exposing government…
AI Agents: New Authorization Bypass Paths in Cybersecurity
AI agents boost automation but often run with broad permissions, allowing actions beyond user access and…
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
Lumen Technologies’ Black Lotus Labs null-routed traffic to 550+ Kimwolf/Aisuru botnet C2s after identifying a surge…
Microsoft Disrupts RedVDS Cybercrime Infrastructure Used for Fraud
Microsoft’s legal action disrupts RedVDS, a cybercrime service used for phishing and BEC fraud, linked to…
4 Outdated Habits Destroying Your SOC’s MTTR in 2026
Leading SOCs reduce MTTR/MTTD by automating behavior-based analysis, not manual reviews. Update outdated cybersecurity habits in…
Drones to Diplomas: Russia’s University Linked to $25M Essay Mill
Krebs exposes a $25M essay mill tied to a Russian university building drones for Ukraine war,…





