Blog

  • AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

    AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

    A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries.
    That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026.
    “No exploitation of FortiGate

  • Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches.
    The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers.
    “It scans codebases for security vulnerabilities and suggests targeted

  • CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

    CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
    The vulnerabilities in question are listed below –

    CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code

  • EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

    EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

    With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness.
    EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite,

  • BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

    BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

    Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and 
    The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the

  • Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

    Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

    In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months.
    “On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI

  • Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

    Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

    Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran.
    Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused

  • PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

    PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

    Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence.
    The malware has been codenamed PromptSpy by ESET. The malware is equipped to capture lockscreen data, block uninstallation efforts, gather device information, take screenshots,

  • INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

    INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

    An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries.
    The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure and actors behind high-yield investment

  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

    Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

    Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.
    Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.
    The high-severity vulnerability, tracked as CVE-2026-26119, carries a