Cyber
AI in Cyber
AI-powered threats, defense, vulnerabilities and the future of InfoSec.
5 sources · 48 stories
Cyber
Chrome CVE made me go digging and I found a container image in prod that hasn't been updated since 2023
So this new Chrome zero-day got me paranoid about our headless browser containers. Started auditing and found a PDF gene…
Cyber
RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
Cyber
AI Agent Threat Intel (Feb 2026 month to date): Tool chain escalation displaces instruction override as #1 technique, agent-targeting attacks hit 26.4% - 91K production interactions
Monthly threat intelligence from production AI agent deployments. 91,284 interactions, 47 deployments, 35,711 threats, d…
Cyber
ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways
Cyber
Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 – Mozilla Hacks - the Web developer blog
Cyber
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Cyber
Using Passkeys for more than just Auth
SponsoredAdvertisement
Cyber
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Cyber
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
Cyber
AI 7/10
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Cyber
APT28 Targeted European Entities Using Webhook-Based Macro Malware
Cyber
Another exposed Supabase DB strikes: 20k+ attendees and FULL write access
Cyber
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
Cyber
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
SponsoredAdvertisement
Cyber
Have you tried turning it off and on again? On bricking OT devices (part 2)
Crypto
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Cyber
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
Cyber
Malicious Chrome extension targeting Apple App Store Connect developers through fake ASO service - full analysis
Discovered a malicious Chrome extension (mimplmibgdodhkjnclacjofjbgmhogce) on its first day of deployment while testing …
Cyber
How a single typo led to RCE in Firefox
Cyber
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
Cyber
AI 10/10
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
SponsoredAdvertisement
Cyber
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are o…
Cyber
Your Samsung Weather App Is a Fingerprint: How saved locations create a persistent cross-session tracking identifier
I analyzed 9,211 weather API requests from 42 Samsung devices over five days and found that the pre-installed Samsung We…
Cyber
In Memoriam: Jason Snitker, a.k.a. Parmaster. RIP Legend
Rest easy, Par. The wire remembers.
Cyber
Discovery & Analysis of CVE-2025-29969
Cyber
[CVE-2026-0714] TPM-sniffing LUKS Keys on an Embedded Device
Cyber
Compromising Cline's Production Releases just by Prompting an Issue Triager
Cyber
CRESCENTHARVEST: Iranian protestors and dissidents targeted in cyberespionage campaign
SponsoredAdvertisement
Cyber
Log Poisoning in OpenClaw
Cyber
Prompt Injection Standardization: Text Techniques vs Intent
Cyber
Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services
Cyber
When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise
Cyber
nono - kernel-enforced capability sandbox for AI agents
Sharing a tool I've been building to address the permissions problem with AI agents that often have unfettered shell acc…
Cyber
[Analysis] Massive Active GitHub Malware Campaign | Hundreds of Malicious Repositories Identified
I've spent the last several hours investigating what I initially thought was a single malicious fork of a macOS app. It …
Cyber
sandboxec: A lightweight command sandbox for Linux, secure-by-default, built on Landlock.
you can actually run agents safely without breaking your machine using linux kernel-native security module (LSM), so no …
SponsoredAdvertisement
Cyber
Patch Tuesday, February 2026 Edition
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software,…
Cyber
Please Don’t Feed the Scattered Lapsus ShinyHunters
Read More »]]>
Cyber
Who Operates the Badbox 2.0 Botnet?
The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices ̵…
Cyber
Kimwolf Botnet Lurking in Corporate, Govt. Networks
A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems…
Cyber
Patch Tuesday, January 2026 Edition
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supporte…
Cyber
Who Benefited from the Aisuru and Kimwolf Botnets?
Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices …
Cyber
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vu…
SponsoredAdvertisement
WokPost Weekly
Top AI stories across 20 topics, every Sunday.