RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

24/02/2026 0 Comments 0 tags

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

24/02/2026 0 Comments 0 tags

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

24/02/2026 0 Comments 0 tags

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

24/02/2026 0 Comments 0 tags

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

24/02/2026 0 Comments 0 tags

The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

24/02/2026 0 Comments 0 tags

Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.

APT28 Targeted European Entities Using Webhook-Based Macro Malware

23/02/2026 0 Comments 0 tags

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo’s LAB52 threat

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

23/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. “Analysis of the

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

23/02/2026 0 Comments 0 tags

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public

How Exposed Endpoints Increase Risk Across LLM Infrastructure

23/02/2026 0 Comments 0 tags

As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are