-
A new open-source tool is bridging the gap between artificial intelligence and offensive security operations. GHOSTCREW is an advanced AI red team assistant that leverages Large Language Models (LLMs), Model Context Protocol (MCP), and Retrieval-Augme…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A threat actor group operating under the name “Crimson Collective” has publicly claimed responsibility for a significant data breach targeting Brightspeed, the United States’ third-largest fiber broadband infrastructure builder. The t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Malware authors continue to adopt legitimate software protection tools to shield their malicious code from security researchers. A prime example is the “VVS Stealer,” a Python-based malware family actively targeting Discord users. By levera…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In a disturbing evolution of the cybercrime landscape, a self-sustaining cycle of infection has emerged in which victims of malware are being unwillingly conscripted into the ranks of attackers. New research from the Hudson Rock Threat Intelligence Tea…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Eaton has issued a critical security advisory warning users about multiple high-severity vulnerabilities in its UPS Companion software that could allow attackers to execute arbitrary code on affected systems. The power management company released patch…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
QNAP has released a security advisory addressing multiple vulnerabilities in its License Center application. If left unpatched, these flaws could allow attackers to steal sensitive information, crash system processes, or modify memory on affected Netwo…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Finnish authorities have detained a cargo vessel suspected of damaging an undersea telecommunications cable connecting Helsinki to Estonia. The incident has raised fresh concerns about potential hybrid warfare targeting critical infrastructure in the B…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In December 2025, the Iran-linked hacking group known as Handala escalated its influence operations against Israel’s political establishment by publishing material it claimed was pulled from the fully “compromised” mobile devices of two high-profile of…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own application infrastructure to bypass enterprise email security controls. Attackers sent decept…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A threat actor operating under the alias “victim” has claimed responsibility for a significant data breach targeting Tokyo FM Broadcasting Co., Ltd., a central radio broadcasting station in Japan. The alleged intrusion, which was observed o…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


