Cyber Security

Elastic MCP Apps bring security and observability workf...

Elastic has announced MCP Apps for Elastic, delivering agent-native UI experienc...

Lotus Wiper Malware Targets Venezuelan Energy Systems i...

Cybersecurity researchers have discovered a previously undocumented data wiper t...

Toxic Combinations: When Cross-App Permissions Stack in...

On January 31, 2026, researchers disclosed that Moltbook, a social network built...

OneDrive updates focus on AI, access control, and compl...

Microsoft OneDrive’s recent updates focus on improving intelligence, collaborati...

Phishing reclaims the top initial access spot, attacker...

Phishing returned as the leading method attackers used to break into organizatio...

Tencent’s QClaw AI agent app arrives on Windows and macOS

Tencent has opened an international beta of QClaw, an AI agent application aimed...

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 ...

Microsoft has released out-of-band updates to address a security vulnerability i...

Mustang Panda’s New LOTUSLITE Variant Targets India Ban...

Cybersecurity researchers have discovered a new variant of a known malware calle...

Cohere AI Terrarium Sandbox Flaw Enables Root Code Exec...

A critical security vulnerability has been disclosed in a Python-based sandbox c...

Shadow AI, deepfakes, and supply chain compromise are r...

Financially motivated attacks continued to drive the bulk of cyber incidents aga...

Apple Intelligence flaw kept stolen tokens reusable on ...

Apple claims that Apple Intelligence, a GenAI service provided on its operating ...

PentAGI: Open-source autonomous AI penetration testing ...

Penetration testers have long relied on collections of specialized tools, manual...

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

A cautionary tale illustrates why the person negotiating should never be involve...

Thunderbird 150 arrives with encrypted message search a...

Released today, Thunderbird 150.0 brings eight new features, a round of bug fixe...

Exploits Turn Windows Defender into Attacker Tool

Three proof-of-concept exploits are being used in active attacks against Microso...

SystemBC C2 Server Reveals 1,570+ Victims in The Gentle...

Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) opera...