-
Security researchers have identified a sophisticated jailbreak technique called Semantic Chaining that successfully bypasses safety filters in leading multimodal AI models, including Grok 4 and Gemini Nano Banana Pro. The vulnerability exploits how the…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A malicious Visual Studio Code extension posing as an AI coding assistant has been caught secretly installing a fully functional remote access tool (RAT) on developer machines. The extension looks convincing at first glance: polished branding, a profes…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
France’s government has made a decisive move to eliminate foreign videoconferencing platforms from its operations, rejecting Zoom and Microsoft Teams in favor of a domestically controlled alternative. On January 26, 2026, France announced the nat…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In the evolving landscape of cyber threats, attackers increasingly leverage Python to develop sophisticated Remote Access Trojans (RATs) that evade traditional security controls. Python’s widespread adoption and cross-platform compatibility make …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Matanbuchus is a malicious C++-based downloader that has been sold as Malware-as-a-Service (MaaS) since 2020. Initially known as a simple loader for second-stage payloads, it has steadily evolved into a flexible backdoor platform that is increasingly t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user accounts and sensitive booking data to attackers. The flaws, discovered by Gecko’s AI secur…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new longitudinal study of Magecart-style eSkimming attacks overturns the assumption that discovery equals recovery. Instead of being a one-time incident that ends with script removal, eSkimming is emerging as a long-lived, shape‑shifting threat that …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical zero-day vulnerability has been disclosed in the Gemini MCP Tool, enabling unauthenticated remote attackers to execute arbitrary code on vulnerable installations without requiring user interaction or authentication. The vulnerability, tracke…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A Vietnamese threat actor is using AI-authored code to power a phishing campaign that delivers the PureRAT malware and related payloads, leveraging realistic job-themed lures to compromise corporate systems. The campaign, first documented by Trend Micr…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical vulnerability in IDIS Cloud Manager (ICM) Viewer exposes organizations using IDIS IP cameras to one-click remote code execution (RCE), potentially allowing attackers to compromise Windows systems used to monitor video surveillance fully. IDI…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


