Cognizant TriZetto Data Breach Exposes Health Information of 3.4 Million Patients

Cognizant TriZetto Data Breach TriZetto Provider Solutions, a healthcare technology subsidiary of the IT services giant Cognizant, has officially disclosed a massive cybersecurity data breach affecting the sensitive health information of 3,433,965 patients. The healthcare organization recently filed a formal data breach notification revealing that malicious threat actors successfully compromised their external systems. This extensive […]
OpenAI Launches Codex Security that Discover, Validate and Patch Vulnerabilities

OpenAI Launches Codex Security OpenAI has announced the launch of Codex Security, an application security agent engineered to autonomously identify, validate, and remediate complex vulnerabilities within enterprise and open-source codebases. Formerly known as Aardvark, the tool leverages frontier AI models to provide context-aware security assessments, aiming to replace noisy static analysis tools that inundate security […]
New ClickFix Attack leverages Windows Terminal for Payload Execution

Cybersecurity researchers have uncovered a new wave of ClickFix attacks that now exploit Windows Terminal to deliver malicious payloads directly onto victim machines. Unlike earlier iterations of this social engineering technique, which relied on the Windows Run dialog, this latest campaign leads users into opening a privileged command environment themselves, making it harder to detect […]
RMM Tools Essential for IT Operations but Increasingly Weaponized by Attackers

Remote Monitoring and Management (RMM) tools are the backbone of modern IT operations. Security professionals rely on them daily to patch systems, troubleshoot issues, and manage entire networks from anywhere. These tools deliver speed, control, and convenience — qualities every IT team values. But the same features that make them indispensable have made them a […]
FBI Investigates Hack on its Wiretap and Critical Surveillance Systems

FBI Investigates Hack The Federal Bureau of Investigation has confirmed a cybersecurity incident targeting a sensitive internal network used to manage wiretapping operations and foreign intelligence surveillance warrants, raising serious concerns among national security officials about the potential exposure of classified law enforcement data. “The FBI identified and addressed suspicious activities on FBI networks, and […]
China-Nexus Hackers Attacking Telecommunication Providers With New Malware

A China-linked advanced persistent threat actor has been actively targeting telecommunications providers across South America since 2024, deploying three new malware implants to gain deep access into critical network infrastructure. The group, tracked as UAT-9244, operates against both Windows and Linux-based endpoints, as well as network edge devices — the embedded hardware that telecom providers […]
Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content

Artificial intelligence tools are now a core part of everyday workflows — from browsers that summarize web pages to automated agents that help users make decisions online. As these tools become more capable, attackers are learning how to turn them against the very people they are designed to serve. A method called indirect prompt injection […]
Threat Actors Using Fake Claude Code Download to Deploy Infostealer

Cybercriminals have found a new way to target developers and IT professionals by setting up fake download pages that impersonate Claude Code, a legitimate AI coding assistant. These deceptive pages trick users into downloading what appears to be an official installation package, but instead silently deploy an infostealer malware onto the victim’s system. The use […]
RedAlert Mobile Espionage Campaign Targets Civilians with Trojanized Rocket Alert App for Surveillance

War zones have always been hunting grounds for opportunistic attackers, but the RedAlert mobile espionage campaign marks one of the most calculated examples of weaponizing civilian fear. Against the backdrop of the ongoing Israel-Iran kinetic conflict, threat actors crafted a trojanized version of Israel’s official “Red Alert” emergency app — a life-saving tool civilians depend […]
Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access

Cisco Catalyst SD-WAN Vulnerabilities An urgent security advisory from Cisco warns that multiple vulnerabilities in Cisco Catalyst SD-WAN Manager could allow attackers to bypass authentication, gain root access, and overwrite critical files. Two of these vulnerabilities are already being exploited in the wild by hackers, making immediate remediation critical. The advisory details five vulnerabilities, led […]