News

Braintrust AWS Breach Exposes AI Provider API Keys, All Customers Ordered to Rotate Secrets

AI evaluation startup Braintrust confirms AWS account breach exposing AI provider API keys. All org admins must rotate secrets immediately. Timeline and steps

Read More
News

Zara Data Breach: 197,000 Records Now in Have I Been Pwned After ShinyHunters Attack

ShinyHunters breached Zara parent Inditex via analytics vendor Anodot, stealing 192 GB from Google BigQuery. 197,000 records now in Have I Been Pwned.

Read More
News

PamDOORa: New Linux Backdoor Sells for $900 on Russian Forum, Harvests SSH Credentials via PAM

PamDOORa is a commercial Linux PAM backdoor sold on the Rehub Russian cybercrime forum. It installs a magic-password hook into the SSH auth

Read More
News

Attackers Abuse Bun JavaScript Runtime to Spread NWHStealer Infostealer

Malwarebytes researchers find NWHStealer, a Rust-based infostealer, being distributed via the Bun JavaScript runtime to evade antivirus detection on Windows systems.

Read More
News

MuddyWater Uses Chaos Ransomware as False Flag in Microsoft Teams Espionage Campaign

Iranian APT MuddyWater disguised a state-sponsored espionage operation as a Chaos ransomware attack, using Microsoft Teams social engineering to steal credentials and data.

Read More
News

Underground Criminal Forums Are Drowning in AI-Generated Spam — and Cybercriminals Hate It

Research analyzing 100M+ underground forum posts finds cybercriminals struggling to adopt AI meaningfully, safety guardrails holding, and AI slop flooding their own platforms.

Read More
News

ClaudeBleed: Claude Chrome Extension Flaw Lets Attackers Steal Gmail and GitHub Data

ClaudeBleed is a Chrome extension vulnerability in Anthropic's Claude that lets any malicious extension inject prompts and exfiltrate Gmail, GitHub, and Drive data.

Read More
Blog

SHA-1 Algorithm Explained: How It Works, Step by Step

A step-by-step technical breakdown of the SHA-1 algorithm — padding, message schedule, 80-round compression, security status, and migration to SHA-256.

Read More
News

ACSC Warns: ClickFix Campaign Delivers Vidar Stealer via Compromised Australian WordPress Sites

Australia's ACSC warns of an active ClickFix campaign using compromised WordPress sites to deliver Vidar Stealer across multiple Australian sectors. Mitigations inside.

Read More
News

OceanLotus Suspected of Using PyPI to Deliver ZiChatBot Malware via Zulip C2

Kaspersky researchers attribute malicious PyPI packages delivering ZiChatBot malware to OceanLotus APT, using Zulip team chat REST APIs as covert command-and-control infrastructure.

Read More