Risk & Resilience

Wormable XMRig Campaign Exploits BYOVD And Time-Based Logic Bomb To Target Systems

Cybersecurity researchers uncover a wormable XMRig cryptojacking campaign using pirated software, BYOVD exploits, and time-based logic bombs to maximize mining and propagate across systems.

Microsoft 365 Copilot Bug Exposed Confidential Emails Despite DLP Policies

Microsoft confirms a bug in Microsoft 365 Copilot allowed sensitive emails with labels to be summarized in Copilot Chat, bypassing DLP controls, fixed on February 3, 2026.

Cline CLI 2.3.0 Supply Chain Attack Led To Unauthorized OpenClaw Installation On Developer Systems

A compromised npm publish token was used to release Cline CLI version 2.3.0, triggering unauthorized installation of OpenClaw on developer systems during an eight hour supply chain attack window.

Security Vulnerabilities Discovered In Live Server Code Runner And Other VS Code Extensions

Researchers disclose critical vulnerabilities in four popular Microsoft Visual Studio Code extensions that could enable file theft and remote code execution across developer environments.

Massiv Android Banking Malware Spread Through Fake IPTV Apps Warn Researchers

Researchers at ThreatFabric uncover Massiv, a new Android banking trojan spread via fake IPTV apps that enables device takeover attacks and mobile financial fraud.

Apple Tests End To End Encrypted RCS Messaging In iOS 26.4 Developer Beta

Apple introduces end to end encrypted RCS messaging in iOS 26.4 developer beta, alongside enhanced Memory Integrity Enforcement and default Stolen Device Protection features.

Microsoft Warns Of Manipulative Prompts Hidden In Summarize With AI Buttons

Microsoft researchers identify more than 50 hidden prompts embedded in Summarize with AI buttons that influence assistants to remember and recommend specific brands without user awareness.

Agentic AI Transforms Governance Risk And Compliance Beyond Task Automation

Yair Kuznitsov, CEO of Anecdotes, explains how agentic AI is reshaping Governance, Risk, and Compliance by embedding autonomous decision making into GRC workflows.

The Uncomfortable Truth About More Visibility In Cybersecurity

Rising cyber attacks, shrinking time to exploitation, and ransomware volatility reveal why more visibility is not enough. Exposure Management is emerging as an operational model focused on reducing exposure and accelerating safe remediation.

First Malicious Microsoft Outlook Add In Found Stealing Over 4,000 Credentials In Supply Chain Attack

Cybersecurity researchers uncover the first known malicious Microsoft Outlook add in used to steal more than 4,000 Microsoft credentials through an abandoned domain takeover supply chain attack.

83 Percent Of Ivanti EPMM Exploits Traced To Single IP On Bulletproof Hosting Infrastructure

GreyNoise reports that 83 percent of Ivanti EPMM exploitation attempts are linked to a single IP on PROSPERO bulletproof hosting, targeting critical CVE-2026-1281 and CVE-2026-1340 vulnerabilities.

North Korea Linked UNC1069 Uses AI Lures And Fake Zoom Meetings To Target Cryptocurrency Firms

Google Mandiant uncovers North Korea linked UNC1069 using AI generated lures, fake Zoom meetings, and multiple malware families to target cryptocurrency organizations on Windows and macOS.

Recent articles

spot_img