Blog

  • Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

    Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

    Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1.
    The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It’s not effective against the latest version of iOS. The findings were first reported by WIRED.
    “The

  • New RFP Template for AI Usage Control and AI Governance 

    New RFP Template for AI Usage Control and AI Governance 

    As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for.
    The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements?
    As AI

  • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems.
    The names of the packages are listed below –

    nhattuanbl/lara-helper (37 Downloads)
    nhattuanbl/simple-queue (29 Downloads)
    nhattuanbl/lara-swagger (49 Downloads)

  • APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

    APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

    Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.
    “Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,” Check Point said

  • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.
    The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an

  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.
    The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from

  • Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

    Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

    Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time.
    The Paradox at the Gate:

  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

    Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

    Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.
    The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described

  • Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

    Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

    Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.
    The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component.
    “Memory corruption when adding user-supplied data without checking available buffer space,” Qualcomm said in an advisory,

  • SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

    SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

    The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.
    The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based