Blog

  • Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026.
    Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky.
    “Two batch scripts are responsible for initiating the

  • Toxic Combinations: When Cross-App Permissions Stack into Risk

    Toxic Combinations: When Cross-App Permissions Stack into Risk

    On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents.
    The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API keys shared between agents,

  • Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

    Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

    Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges.
    The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It’s rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw.
    “Improper verification of cryptographic

  • Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

    Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

    Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme related to India’s banking sector.
    “The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than

  • Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

    Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

    A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution.
    The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system.
    “Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal,” according to

  • 5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

    5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

    Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage. 
    The root cause of slow MTTR is almost never “not enough analysts.” It is almost always the same structural problem: threat intelligence that exists

  • NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

    NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

    Cybersecurity researchers have discovered a new iteration of an Android malware family called NGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate.
    “The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated,” ESET security researcher Lukáš Štefanko said in a

  • No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

    No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

    The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn’t changed: stolen credentials.
    Identity-based attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential stuffing

  • Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

    Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

    Cybersecurity researchers have discovered a vulnerability in Google’s agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution.
    The flaw, since patched, combines Antigravity’s permitted file-creation capabilities with an insufficient input sanitization in Antigravity’s native file-searching tool, find_by_name, to bypass the program’s Strict

  • CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation.
    The list of vulnerabilities is as follows –

    CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut