Blog

  • AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

    AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

    The AI gold rush is on. But without identity-first security, every deployment becomes an open door. Most organizations secure native AI like a web app, but it behaves more like a junior employee with root access and no manager.
    From Hype to High Stakes
    Generative AI has moved beyond the hype cycle. Enterprises are:

    Deploying LLM copilots to accelerate software development
    Automating customer

  • Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

    Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

    Social engineering attacks have entered a new era—and they’re coming fast, smart, and deeply personalized.
    It’s no longer just suspicious emails in your spam folder. Today’s attackers use generative AI, stolen branding assets, and deepfake tools to mimic your executives, hijack your social channels, and create convincing fakes of your website, emails, and even voice. They don’t just spoof—they

  • New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

    New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

    Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin technique to enable ad fraud.
    The sneaky approach essentially involves a scenario wherein two variants of an application share the same package name: A benign “decoy” app that’s hosted on the Google Play Store and its evil twin, which is

  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

    State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

    Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon.
    The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where “CL” stands for “cluster” and “STA” refers to “state-backed motivation.”
    “The threat actors behind this

  • Securing Agentic AI: How to Protect the Invisible Identity Access

    Securing Agentic AI: How to Protect the Invisible Identity Access

    AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can’t easily see. These “invisible” non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have

  • AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

    AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

    Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the foundation for several other variants.
    “AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants,” ESET

  • North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

    North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

    The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks.
    The packages, per Socket, have attracted more than 17,000 downloads, and incorporate a previously undocumented version of a malware

  • The Unusual Suspect: Git Repos

    The Unusual Suspect: Git Repos

    While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems
    Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping

  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

    ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

    In cybersecurity, precision matters—and there’s little room for error. A small mistake, missed setting, or quiet misconfiguration can quickly lead to much bigger problems. The signs we’re seeing this week highlight deeper issues behind what might look like routine incidents: outdated tools, slow response to risks, and the ongoing gap between compliance and real security.
    For anyone responsible

  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

    CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

    India’s Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said was a transnational cybercrime syndicate that carried out “sophisticated” tech support scams targeting citizens of Australia and the United Kingdom.
    The fraudulent scheme is estimated to have led to losses worth more than £390,000 ($525,000) in the United Kingdom alone.
    The law