Blog

  • Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

    Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

    Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence.

    The vulnerabilities, collectively dubbed

    Claw Chain

    by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below –

  • What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

    What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

    In Your Biggest Security Risk Isn’t Malware — It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender’s analysis

  • TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

    TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

    OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner.
    “Upon identification of the malicious activity, we worked quickly to investigate, contain, and take steps to

  • On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

    On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

    Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild.
    The vulnerability, tracked as CVE-2026-42897 (CVSS score: 8.1), has been described as a spoofing bug stemming from a cross-site scripting flaw. An anonymous researcher has been credited with discovering and reporting the issue.

  • CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

    CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

    The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026.
    The vulnerability is a critical authentication bypass tracked as CVE-2026-20182. It’s

  • Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

    Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

    The Belarus-aligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in Ukraine.
    Active since at least 2016, Ghostwriter has been linked to both cyber espionage and influence operations targeting neighboring countries, particularly Ukraine. It’s also tracked under the monikers FrostyNeighbor, PUSHCHA, Storm-0257, TA445, UAC‑0057

  • PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

    PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

    Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an open-source multi-agent orchestration framework, within four hours of public disclosure.
    The vulnerability in question is CVE-2026-44338 (CVSS score: 7.3), a case of missing authentication that exposes sensitive endpoints to anyone, potentially allowing an attacker to invoke the

  • How AI Hallucinations Are Creating Real Security Risks

    How AI Hallucinations Are Creating Real Security Risks

    AI hallucinations are introducing serious security risks into critical infrastructure decision-making by exploiting human trust through highly confident yet incorrect outputs. When an AI model lacks certainty, it doesn’t have a mechanism to recognize that. Instead, it generates the most probable response based on patterns in its training data, even if that response is inaccurate. These outputs

  • Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

    Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

    An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities has returned with two more zero-days involving a BitLocker bypass and a privilege escalation impacting Windows Collaborative Translation Framework (CTFMON).
    The security defects have been codenamed YellowKey and GreenPlasma, respectively, by the researcher, who goes by the online aliases Chaotic Eclipse

  • New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

    New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

    Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks.
    Codenamed Fragnesia, the security vulnerability is tracked as CVE-2026-46300 (CVSS score: 7.8) and is rooted in the Linux kernel’s XFRM