China-linked Amaranth-Dragon and Mustang Panda target Southeast Asian governments using WinRAR exploit and PlugX phishing ...
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, ...
A high-severity OpenClaw flaw allows one-click remote code execution via token theft and WebSocket hijacking; patched in ...
Leaked non-human identities like API keys and tokens are becoming a major breach driver in cloud environments. Flare shows ...
Adversaries weaponized recruitment fraud to steal cloud credentials, pivot through IAM misconfigurations, and reach AI ...
The preprint, To Defend Against Cyber Attacks, We Must Teach AI Agents to Hack, released on arXiv, challenges the prevailing ...
Attackers exploited Hugging Face’s trusted infrastructure to spread an Android RAT, using fake security apps and thousands of ...
Cryptocurrency’s security story is changing, and not in the way most investors expect or would like to, as while crypto losses are on the rise, so too is onchain security. Even as 2025 went down as ...
As AI shifts from helpful copilot to independent operator, enterprises are discovering that identity—not networks or ...
The hype around the exploits of centralized digital asset exchanges (CEX) and democratized digital asset exchanges (DEX) ...
RedLine, Lumma, and Vidar adapted in 48 hours. Clawdbot's localhost trust model collapsed, plaintext memory files sit exposed ...
After changing its name from Clawdbot to Moltbot to OpenClaw within days, the viral AI agent faces security questions and a ...