Blog

  • Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges.
    According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting high-precision calculation software to tamper

  • CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
    The list of vulnerabilities is below –

    CVE-2024-57726 (CVSS score: 9.9) – A missing authorization vulnerability in

  • FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

    FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with a new malware called FIRESTARTER.
    FIRESTARTER, per CISA and the U.K.’s National Cyber Security Centre (NCSC), is assessed to be a backdoor designed for remote access

  • NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

    NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

    The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control laws.
    “For years, NASA employees

  • Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

    Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

    The AI Agent Authority Gap – From Ungoverned to Delegation
    As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly.
    The issue is not simply that agents are new actors. It is that agents are delegated actors. They do not emerge with independent authority. They are triggered, invoked, provisioned, or

  • 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025.
    “Once launched, these apps redirect users to browser pages designed to look similar to the App Store and distribute trojanized versions of legitimate wallets,” Kaspersky

  • Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

    Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

    Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for remote access.
    Zscaler ThreatLabz, which discovered the campaign last month, has attributed it with high confidence to Tropic Trooper (aka

  • LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

    LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

    A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure.
    The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7.5), relates to a Server-Side Request Forgery (SSRF) vulnerability that could be exploited to access sensitive data.
    “A server-side

  • UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware

    UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware

    A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts.
    “As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT help desk employees, convincing their victim to accept a Microsoft Teams chat invitation from an account

  • [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

    [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

    Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly.
    Well, that world is already here.
    Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We call this the Collapsing Exploit Window, and it means your