Cyber Security

Cyber Security
Cyber Security

Cybersecurity Companies Stocks Fall as Anthropic Tests Powerful New Model

cybersecurity-companies-stocks-fall-as-anthropic-tests-powerful-new-model

Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an extraordinarily powerful new AI model with advanced vulnerability-discovery capabilities. Anthropic is actively trialing a new tier of artificial intelligence models codenamed “Capybara,” with the flagship model operating under the moniker “Mythos”. Internal documents indicate that Mythos significantly outperforms the company’s […]

CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks

cisa-warns-of-f5-big-ip-vulnerability-actively-exploited-in-attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively leveraged in real-world attacks. The vulnerability, tracked as CVE-2025-53521, was officially listed on March 27, 2026, with a remediation deadline of March 30, […]

European Commission Confirms Cyberattack Following AWS Account Hack

european-commission-confirms-cyberattack-following-aws-account-hack

The European Commission has officially confirmed a cyberattack following a targeted cyberattack that compromised its Amazon Web Services (AWS) account. Discovered on March 24, the intrusion specifically affected the external cloud environment that hosts the Commission’s public web presence on the Europa.eu platform. Despite the severity of the unauthorized access, immediate containment procedures ensured that […]

Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed Kernel Drivers by Default

windows-11-and-server-2025-update-to-block-untrusted-cross-signed-kernel-drivers-by-default

Microsoft is taking a major step to harden the Windows operating system against kernel-level threats by removing trust for drivers signed by the deprecated cross-signed root program. Starting with the April 2026 update, Windows 11 and Windows Server 2025 will block these untrusted drivers by default. This policy ensures that only drivers certified through the […]

FBI Chief Kash Patels Gmail Account was Hacked by Iranian Hackers

fbi-chief-kash-patels-gmail-account-was-hacked-by-iranian-hackers

Iran-linked hackers have claimed responsibility for breaching FBI Director Kash Patel’s personal Gmail inbox, leaking photographs, documents, and email correspondence online. The hacker group Handala Hack Team announced the breach on their website, declaring that Patel “will now find his name among the list of successfully hacked victims.” The leaked materials, totaling approximately 800 megabytes, […]

Claude Chrome Extension 0-Click Vulnerability Enables Silent Prompt Injection Attacks

claude-chrome-extension-0-click-vulnerability-enables-silent-prompt-injection-attacks

A critical zero-click vulnerability in Anthropic’s Claude Chrome Extension exposed over 3 million users to silent prompt-injection attacks, allowing malicious websites to hijack the AI assistant without user interaction. The flaw, now patched, could have enabled attackers to steal Gmail access tokens, read Google Drive files, export chat history, and send emails all invisibly. The […]

New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware

new-clickfix-attack-leverage-windows-run-dialog-box-and-macos-terminal-to-deploy-malware

A social engineering technique called ClickFix has resurfaced with significant force, tricking users on both Windows and macOS into manually executing malicious commands that quietly install malware on their devices. First documented in late 2023, the method has rapidly grown from a niche tactic into one of the most widely adopted initial access strategies across […]

Synology DiskStation Manager Vulnerability Allow Remote Attackers to Execute Arbitrary Commands

synology-diskstation-manager-vulnerability-allow-remote-attackers-to-execute-arbitrary-commands

A critical security advisory has been issued for a severe vulnerability in DiskStation Manager (DSM) that allows unauthenticated remote attackers to execute arbitrary commands. Given the widespread use of Synology network-attached storage (NAS) systems for enterprise backups and data management, network administrators are strongly urged to apply the available patches immediately. Tracked as CVE-2026-32746, the […]

Ghost SPN Attack Lets Hackers Conduct Stealthy Kerberoasting Under the Radar

ghost-spn-attack-lets-hackers-conduct-stealthy-kerberoasting-under-the-radar

A sophisticated evolution of Kerberoasting dubbed the “Ghost SPN” attack that allows adversaries to extract Active Directory credentials while erasing all traces of their activity, rendering traditional detection models effectively blind to the intrusion. The attack revealed by Trellix security researchers utilizes delegated administrative permissions, creating temporary exposure windows. Kerberoasting is a well-documented post-exploitation technique […]

China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign

china-linked-hackers-breach-southeast-asian-military-systems-in-long-running-spy-campaign

A sophisticated and long-running cyber espionage campaign, tracked as CL-STA-1087, has been quietly targeting military organizations across Southeast Asia since at least 2020. The operation, assessed with moderate confidence to be linked to a China-aligned threat actor, focuses on collecting strategic and operational intelligence rather than simply stealing large amounts of data. The attackers prioritized staying […]