Blog

  • SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

    SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

    SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.
    The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below –

    CVE-2025-40538 – A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary

  • CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

    CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
    The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute

  • RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue.
    The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure.
    “Attackers can craft hidden instructions inside a

  • UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

    UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

    A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor’s targeting beyond Ukraine and into entities supporting the war-torn nation.
    The activity, which targeted an unnamed entity involved in regional

  • Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.
    The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms

  • APT28 Targeted European Entities Using Webhook-Based Macro Malware

    APT28 Targeted European Entities Using Webhook-Based Macro Malware

    The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe.
    The activity, per S2 Grupo’s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. “The campaign relies on basic tooling and the exploitation of legitimate services

  • Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

    Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

    Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts.
    “Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim

  • ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

    ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

    Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar.
    Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools

  • How Exposed Endpoints Increase Risk Across LLM Infrastructure

    How Exposed Endpoints Increase Risk Across LLM Infrastructure

    As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in

  • MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

    MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

    The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo.
    The activity, first observed on January 26, 2026, has resulted in the deployment of new malware families that share