-
OpenAI has confirmed that Chinese-linked operators misused ChatGPT as part of a broader campaign that blended cyber operations, online harassment, and covert influence tactics, according to its latest threat report “Disrupting malicious uses of AI.” …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated cloaking platform called 1Campaign, designed to help attackers run malicious Google Ads campaigns while evading detection. The service acts as a full‑service infrastructure for malvertising, filtering out researchers and automated scann…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Zyxel has rolled out critical security patches for multiple vulnerabilities affecting its 4G LTE/5G NR CPE, DSL/Ethernet CPE, Fiber ONTs, Security Routers, and Wireless Extenders. The flaws range from null pointer dereferences causing Denial-of-Service…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ServiceNow has disclosed a critical security vulnerability in its AI Platform that could allow unauthenticated attackers to remotely execute code within the ServiceNow Sandbox environment. Tracked as CVE-2026-0542, the flaw was formally published on Fe…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ResidentBat is a custom Android spyware implant used by the Belarusian KGB to turn seized smartphones into long‑lived surveillance platforms against journalists and civil society targets. Operating outside the Play Store ecosystem and requiring hands‑o…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A hacker successfully manipulated Anthropic’s Claude AI to launch a sophisticated month-long cyberattack against Mexican government agencies. Between December 2025 and January 2026, the attacker utilized “jailbreaking” techniques to bypass …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Every so often, a new piece of malware emerges that truly shifts the threat landscape. Oblivion, a newly discovered Android Remote Access Trojan (RAT), appears to be one such moment. Unlike recycled or buggy Remote Access Trojan (RATs) seen across unde…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hydra Saiga is running a long-running espionage campaign that abuses Telegram as command-and-control (C2) to infiltrate critical utilities in Central Asia and exfiltrate sensitive data from government and infrastructure networks. The first known Hydra …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers have released a new Proof of Concept (PoC) for a vulnerability in the Windows Common Log File System (CLFS) driver. The flaw, identified as CVE-2026-2636, allows low-privileged users to force a system into a Blue Screen of Death (B…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Anthropic has unveiled a significant update to its Claude Code platform, introducing a new “Remote Control” feature. This capability allows developers to manage terminal sessions directly from their smartphones or remote web browsers, bridg…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


