Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

25/02/2026 0 Comments 0 tags

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

25/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. “The

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

25/02/2026 0 Comments 0 tags

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth,

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

25/02/2026 0 Comments 0 tags

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

25/02/2026 0 Comments 0 tags

Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data,

Manual Processes Are Putting National Security at Risk

25/02/2026 0 Comments 0 tags

Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360:

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

25/02/2026 0 Comments 0 tags

A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

25/02/2026 0 Comments 0 tags

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

25/02/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

24/02/2026 0 Comments 0 tags

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven