Mar 13, 2026 | Podcast
https://services.google.com/fh/files/misc/cloud_threat_horizons_report_h12026.pdf According to Google’s Cloud Threat Horizons Report, cybercriminals targeting cloud environments have been increasingly exploiting system vulnerabilities in addition to relying on...
Mar 12, 2026 | Podcast
https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering A new phishing campaign exploiting Microsoft Teams has come to light, aiming to compromise employees by delivering backdoor malware. Attackers are...
Mar 11, 2026 | Podcast
https://research.jfrog.com/post/ghostclaw-unmasked Cybersecurity researchers have identified a malicious npm package masquerading as an OpenClaw installer that deploys a remote access trojan and exfiltrates sensitive data from compromised systems. The package, named...
Mar 10, 2026 | Podcast
Global Law Enforcement Agencies, With Support From Meta, Disrupt Major Criminal Scam Networks Based in Southeast Asia Meta partnered with international law enforcement agencies in a coordinated operation that resulted in the takedown of over 150,000 accounts...
Mar 9, 2026 | Podcast
https://guard.io/labs/agenticblabbering—how-ai-browsers-verbose-reasoning-fuels-the-ultimate-scamming-machine Security researchers at Guardio have demonstrated a critical vulnerability in AI-powered autonomous browsers by successfully tricking Perplexity’s...
Mar 7, 2026 | Podcast
https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east Multiple Iranian hacking groups have conducted hundreds of exploitation attempts against internet-connected surveillance cameras across...