Cybersecurity
Breaches, CVEs, CISA advisories, and threat intelligence
Threat Severity Distribution
Hackers Weaponize Claude Code in Mexican Government Cyberattack
Hackers exploited Claude AI to automate cyberattack operations against the Mexican government, using it to write exploits and exfiltrate over 150GB of sensitive data. This represents a significant escalation in AI-assisted cyber warfare capabilities.
QuickLens Chrome extension steals crypto, shows ClickFix attack
The QuickLens Chrome extension was compromised and used to distribute malware targeting cryptocurrency theft from thousands of users before being removed from the Chrome Web Store.
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
OpenClaw has patched a high-severity vulnerability (ClawJacked) that allowed malicious websites to hijack locally running AI agents via WebSocket connections. The flaw existed in the core system without requiring any plugins or extensions.
Who is the Kimwolf Botmaster “Dort”?
KrebsOnSecurity has identified the operator of Kimwolf, the world's largest botnet, as a Canadian individual who exploited vulnerabilities in residential proxy services to infect IoT devices. The botmaster has escalated to physical threats including swatting attacks against security researchers who disclosed the vulnerability, demonstrating the real-world dangers of botnet operations and the importance of responsible vulnerability disclosure.
Canadian Tire Data Breach Impacts 38 Million Accounts
Canadian Tire suffered a major data breach affecting 38 million accounts, exposing customer names, addresses, email addresses, phone numbers, and encrypted passwords.
All Cyber Intelligence (50)
Samsung TVs to stop collecting Texans’ data without express consent
Samsung reached a settlement with Texas over unauthorized collection of viewing data from smart TVs without proper user consent. The company will now require express consent before collecting content-viewing information from Texas residents.
Hackers Weaponize Claude Code in Mexican Government Cyberattack
Hackers exploited Claude AI to automate cyberattack operations against the Mexican government, using it to write exploits and exfiltrate over 150GB of sensitive data. This represents a significant escalation in AI-assisted cyber warfare capabilities.
QuickLens Chrome extension steals crypto, shows ClickFix attack
The QuickLens Chrome extension was compromised and used to distribute malware targeting cryptocurrency theft from thousands of users before being removed from the Chrome Web Store.
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
OpenClaw has patched a high-severity vulnerability (ClawJacked) that allowed malicious websites to hijack locally running AI agents via WebSocket connections. The flaw existed in the core system without requiring any plugins or extensions.
$4.8M in crypto stolen after Korean tax agency exposes wallet seed
South Korea's National Tax Service exposed a cryptocurrency wallet's recovery phrase in a public press release, resulting in $4.8M theft by hackers. This incident highlights critical operational security failures in government handling of digital assets and underscores the importance of secure key management practices that extend beyond traditional cybersecurity controls.
Who is the Kimwolf Botmaster “Dort”?
KrebsOnSecurity has identified the operator of Kimwolf, the world's largest botnet, as a Canadian individual who exploited vulnerabilities in residential proxy services to infect IoT devices. The botmaster has escalated to physical threats including swatting attacks against security researchers who disclosed the vulnerability, demonstrating the real-world dangers of botnet operations and the importance of responsible vulnerability disclosure.
Canadian Tire Data Breach Impacts 38 Million Accounts
Canadian Tire suffered a major data breach affecting 38 million accounts, exposing customer names, addresses, email addresses, phone numbers, and encrypted passwords.
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Truffle Security discovered nearly 3,000 exposed Google Cloud API keys that could be exploited to authenticate to Gemini endpoints and access private data, revealing a significant security vulnerability in how API keys are handled in client-side code.
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
The Pentagon has designated AI company Anthropic as a supply chain risk after the company refused to allow its Claude AI model to be used for mass domestic surveillance of Americans and fully autonomous weapons systems.
Friday Squid Blogging: Squid Fishing in Peru
Peru has increased its squid catch limit in what appears to be a regular Friday squid-themed blog post. The post serves as an open thread for security discussions not covered elsewhere on the blog.
Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology
Trump administration has ordered all federal agencies to discontinue use of Anthropic's AI technology, while OpenAI, Google, and xAI maintain government contracts. This represents a significant shift in federal AI procurement policy.
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
A ransomware attack has impacted a Mississippi healthcare system, coinciding with HBO's series 'The Pitt' depicting a similar hospital ransomware scenario, highlighting the real-world prevalence of healthcare cyberattacks.
Cities Hosting Major Events Need More Focus on Wireless, Drone Defense
Security experts emphasize that major events like the FIFA World Cup require enhanced focus on wireless and drone defense capabilities, extending beyond conventional physical and cybersecurity measures to address active and passive wireless threats.
Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy
AI-powered security vulnerability detection tools are showing promise but current products are not meeting the speed and accuracy requirements of enterprises and software developers.
Microsoft testing Windows 11 batch file security improvements
Microsoft is testing security and performance improvements for batch file and CMD script execution in Windows 11 Insider Preview builds, addressing potential vulnerabilities in legacy scripting environments.
APT37 hackers use new malware to breach air-gapped networks
North Korean APT37 hackers have deployed new malware tools designed to breach air-gapped networks by leveraging removable drives to transfer data between isolated and internet-connected systems while conducting covert surveillance.
Europol-led crackdown on The Com hackers leads to 30 arrests
Europol's yearlong 'Project Compass' operation resulted in 30 arrests linked to 'The Com,' a cybercrime collective targeting children and teenagers, with 179 total suspects identified.
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
The U.S. Department of Justice seized $61 million in Tether cryptocurrency linked to pig butchering scams, where criminals laundered proceeds stolen from cryptocurrency investment fraud victims.
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
Over 900 Sangoma FreePBX instances remain compromised with web shells following exploitation of a command injection vulnerability since December 2025, with the U.S. accounting for 401 infected systems.
Samsung updates ACR privacy practices after Texas sues TV manufacturers
Texas sued five major smart TV manufacturers (Samsung, Sony, LG, Hisense, TCL) in December for allegedly collecting ACR data without proper consumer consent. Samsung has since updated its privacy practices in response to the lawsuit.
Instagram to start alerting parents when children search for terms relating to self-harm
Instagram is implementing parental alerts in four countries that will notify parents when their children repeatedly search for self-harm or suicide-related content on the platform. This safety feature targets youth protection concerns on social media.
The Case for Why Better Breach Transparency Matters
Organizations routinely provide minimal information about data breaches or fail to disclose them entirely, highlighting a systemic transparency problem in breach reporting practices.
EU lawmakers propose that youth under 16 be barred from social media without parental consent
EU lawmakers are proposing legislation to prohibit social media access for children under 13 entirely, and require parental consent for users aged 13-15. This represents a significant regulatory shift in how social media platforms must handle youth access in the European Union.
CISA warns that RESURGE malware can be dormant on Ivanti devices
CISA has issued a warning about RESURGE malware that can remain dormant on Ivanti Connect Secure devices, exploiting CVE-2025-0282 in zero-day attacks. Organizations using Ivanti devices face potential persistent compromise even after initial detection.
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
A malicious Go module impersonating legitimate crypto libraries has been discovered stealing passwords and deploying the Rekoobe Linux backdoor. The module targets developers through typosquatting, exfiltrating credentials and establishing persistent SSH access.
In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators
Security news roundup covering Russian cyberattacks coordinating with missile strikes, Predator spyware bypassing iOS security indicators, MITRE ATT&CK Advisory Council updates, and data breaches including ShinyHunters' Odido claim.
Third-Party Patching and the Business Footprint We All Share
Third-party software like PDF readers and email clients create significant attack surfaces through inconsistent patching. Action1 highlights how software drift across endpoints increases exploit risk and emphasizes the need for systematic third-party patch management.
Claude Code Security Shows Promise, Not Perfection
Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.
38 Million Allegedly Impacted by ManoMano Data Breach
Hackers stole personal information such as names, email addresses, phone numbers, and other information. The post 38 Million Allegedly Impacted by ManoMano Data Breach appeared first on SecurityWeek .
900 Sangoma FreePBX Instances Infected With Web Shells
The attacks exploited a post-authentication command injection vulnerability in the endpoint manager’s interface. The post 900 Sangoma FreePBX Instances Infected With Web Shells appeared first on Secur
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more pa
Chilean Carding Shop Operator Extradited to US
The 24-year-old suspect has been accused of trafficking over 26,000 cards from a single brand. The post Chilean Carding Shop Operator Extradited to US appeared first on SecurityWeek .
Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline
Anthropic said it sought narrow assurances from the Pentagon that Claude won’t be used for mass surveillance of Americans or in fully autonomous weapons. The post Anthropic Refuses to Bend to Pentagon
Ukrainian man pleads guilty to running AI-powered fake ID site
A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide. [...]
Why Tehran’s Two-Tiered Internet Is So Dangerous
Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s government crackdown against citizen prote
Phishing Attacks Against People Seeking Programming Jobs
This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malwar
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resili
Juniper Networks PTX Routers Affected by Critical Vulnerability
An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902. The post Juniper Networks PTX Routers Affected by Critical Vulnerability appeared fi
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downl
Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effor
Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking
CISA has released an advisory to warn about four vulnerabilities discovered by a researcher in Gardyn Home and Gardyn Studio. The post Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking app
Marquis v. SonicWall Lawsuit Ups the Breach Blame Game
When a company gets breached through a third-party security vendor, who should bear responsibility? For one FinTech company, the answer is the firewall provider.
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
Former Air Force officer arrested for conspiring with hacker to provide flight training to Chinese military
Gerald Eddie Brown, 65, was arrested in Jeffersonville, Indiana on Thursday after spending nearly three years living in China and allegedly providing combat aircraft training to pilots in the Chinese
Wyden blocks Rudd confirmation to lead Cyber Command, NSA
Rudd “does not have the background that would allow him to immediately step into” the role of leading Cyber Command, Wyden wrote in a letter that was included in the Congressional Record on Wednesday.
Previously harmless Google API keys now expose Gemini AI data
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. [...]
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts
Trend Micro warns of critical Apex One code execution flaws
Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]
European DYI chain ManoMano data breach impacts 38 million customers
DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]
Threat modeling AI applications
Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate every misuse or emergent behavior in AI systems. We can , however, identify what can go wrong, assess how bad