Blog

  • The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don’t see it. Your MFA doesn’t stop it. And when an attacker gets hold of one, they don’t need a password.
    OAuth

  • MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck.
    The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution.
    “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code

  • We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Is

    We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Is

    While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of AI as a force multiplier and the pressure to deliver more value faster. But speed is coming at the expense of security.
    In the wake of the

  • ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China.
    While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have enabled the

  • Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.
    The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/

  • 2026: The Year of AI-Assisted Attacks

    2026: The Year of AI-Assisted Attacks

    On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan’s largest internet cafe chain. When asked, the young man shared his motivation for the hack: he wanted to buy Pokémon cards.
    In a sense, this is a fairly conventional story.

  • Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

    Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

    The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor.
    The activity involved using phishing emails that mimic correspondence from the Income Tax Department of India in December 2025, followed by a similar campaign aimed at Russian entities.
    “Both waves followed a nearly identical

  • Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

    Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

    A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the U.S., by exploiting the recently disclosed vulnerability in cPanel.
    The activity, detected by Ctrl-Alt-Intel on May 2, 2026, involves the

  • Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

    Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

    A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses.
    The crackdown was led by the Dubai Police, under the United Arab Emirates (UAE) Ministry of Interior, in partnership with the U.S. Federal

  • CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

    CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
    The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an