Cyber Security

Cyber Crime Cyber Security Data Breaches Training & Career

Vshell Gains Popularity Among Cybercriminals as Cobalt Strike Alternative

A Go‑based remote administration tool known as Vshell is emerging as a favored alternative to Cobalt Strike among both red teams and threat actors. Though marketed as a legitimate network administration and.

Read More
Cyber Security Data Breaches Training & Career

Google Disrupts Chinese Hacker Network Behind 53 Telecom, Gov’t Breaches

Google and its partners have disrupted a major Chinese state-linked cyber espionage campaign that breached at least 53 telecommunications and government entities across 42 countries on four continents. The operation,.

Read More
Cyber Security

Kali Linux Introduces Claude AI for Automated Penetration Testing Using Model Context Protocol Divya By Divya February 26, 2026

Offensive security operations are evolving with a new method for running Kali Linux. By combining Kali with Anthropic’s Claude AI via the Model Context Protocol (MCP), security analysts can now execute.

Read More
Cyber Security Data Breaches

OAuth Vulnerabilities in Entra ID Could Exploit ChatGPT to Breach User Email Accounts Mayura Kathir By Mayura Kathir Feb

OAuth consent attacks in Microsoft Entra ID are giving threat actors a stealthy path to cloud email, and even trusted apps like ChatGPT can become a vehicle if permissions are.

Read More
Cyber Security

Microsoft Alerts Developers of Malicious Next.js Repositories Used in Ongoing Hacker Attacks

Microsoft has warned that threat actors are weaponizing malicious Next.js repositories to compromise developers through what appear to be legitimate projects and recruiting‑style technical assessments. The campaign abuses normal workflows.

Read More
Cyber Security Mobile Security

WhatsApp Rolls Out Optional Password Feature to Strengthen User Security

WhatsApp is developing a new feature to significantly strengthen account security by introducing optional account passwords. Currently available in the Google Play Beta Program through version 2.26.7.8, this functionality aims to add.

Read More
Artificial Intelligence & Cybersecurity Cyber Security

Hackers Exploit DeepSeek and Claude AI to Launch Global Attacks on FortiGate Devices

Hackers are using commercial AI models DeepSeek and Claude to automate attacks against FortiGate firewalls worldwide, turning basic misconfigurations into a high‑volume intrusion campaign. In early February 2026, a misconfigured.

Read More
Community Initiatives Cyber Security Events & Conferences Malware Analysis

North Korean Hackers Exploit Fake IT Worker Schemes and Malicious Interview Lures

North Korean state-backed hackers are running large-scale fake IT worker and “Contagious Interview” campaigns that abuse developer hiring workflows to deliver JavaScript-based malware, steal code and credentials, and covertly generate.

Read More
Cyber Security Data Breaches Industry News

PayPal Data Breach – 6 Months of Users’ Data Leaked Online

PayPal has begun notifying a small number of customers about a significant cybersecurity incident in which their personally identifiable information (PII) was exposed for nearly six months due to a.

Read More
Cyber Security Industry News

ClickFix Exploits Homebrew Workflow to Deploy Cuckoo Stealer for macOS Credential Theft

ClickFix is being weaponized against macOS developers by turning a trusted Homebrew workflow into a stealthy delivery channel for a new infostealer dubbed Cuckoo Stealer. The campaign shows how attackers.

Read More