SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

17/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

17/02/2026 0 Comments 0 tags

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In

My Day Getting My Hands Dirty with an NDR System

17/02/2026 0 Comments 0 tags

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

17/02/2026 0 Comments 0 tags

New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the “Summarize with AI” button that’s being increasingly placed on websites in ways that

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

17/02/2026 0 Comments 0 tags

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

16/02/2026 0 Comments 0 tags

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot and Moltbot) configuration environment. “This finding marks a significant milestone

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

16/02/2026 0 Comments 0 tags

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. “The attacks range in severity from

Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

16/02/2026 0 Comments 0 tags

This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust

Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud

16/02/2026 0 Comments 0 tags

Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’. Technologies

New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

16/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that’s being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on