Cyber Security

Cyber Security
Cyber Security

Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications

hackers-can-abuse-cortex-xdr-live-terminal-feature-for-c2-communications

A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control (C2) channel by attackers. Since this feature runs inside a trusted endpoint detection and response (EDR) agent, the traffic it produces is largely accepted by enterprise security tools, making this a quiet and […]

Threat Actors Weaponized AI Tools to Gain Full Domain Access within 30 Minutes

threat-actors-weaponized-ai-tools-to-gain-full-domain-access-within-30-minutes

In 2025, threat actors turned widely used artificial intelligence tools into weapons for launching fast, precise network intrusions. CrowdStrike’s 2026 Global Threat Report found an 89% year-over-year increase in attacks by AI-enabled adversaries, as criminals used automation and machine-generated scripts to cut the time between initial entry and full domain access to under 30 minutes. […]

OpenClaw Releases 2026.2.23 Released With Security Updates and New AI features

openclaw-releases-20262.23-released-with-security-updates-and-new-ai-features

OpenClaw 2026.2.23 Released OpenClaw, the open-source personal AI assistant with over 215,000 GitHub stars, has released version 2026.2.23, emphasizing robust security hardening alongside advanced AI integrations. This update addresses multiple vulnerabilities and introduces features like Claude Opus 4.6 support, making it a timely boost for privacy-focused users deploying AI gateways locally across macOS, Windows, and […]

North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

north-korean-threat-actors-leverage-fake-it-worker-campaigns-and-contagious-interview-tactics

North Korean nation-state threat actors have been running a two-part operation — posing as job recruiters while embedding fake workers inside real companies. Since at least 2022, these actors have tricked software developers into running malicious code during fake technical interviews, using the malware families BeaverTail and OtterCookie to steal credentials, take remote control of […]

Silver Fox APT Uses DLL Sideloading and BYOVD Techniques in Sophisticated Malware Attacks

silver-fox-apt-uses-dll-sideloading-and-byovd-techniques-in-sophisticated-malware-attacks

The cybersecurity community recently witnessed the emergence of targeted malware campaigns linked to the Silver Fox threat group. This operation focuses heavily on Asia, targeting local organizations with carefully localized lures. By disguising attacks as routine business communications, actors successfully distributed the Winos 4.0 malware, known as ValleyRat, into corporate networks. To compromise victim systems, […]

Cybersecurity News Weekly: PayPal Breach, Chrome 0-Day, BeyondTrust RCE Exploit, and More

cybersecurity-news-weekly:-paypal-breach,-chrome-0-day,-beyondtrust-rce-exploit,-and-more

Cybersecurity News Weekly Welcome to this week’s Cybersecurity Weekly Digest, your curated roundup of the most critical threats, attacks, breaches, and vulnerabilities making headlines from February 16 to 22, 2026. This week proved to be one of the most eventful of the year so far. Ransomware operators doubled down on enterprise targets, with the Hellcat […]

Multiple Hacking Groups Exploit OpenClaw Instances to Steal API key and Deploy Malware

multiple-hacking-groups-exploit-openclaw-instances-to-steal-api-key-and-deploy-malware

Hacking Groups Exploit OpenClaw Instances A widespread exploitation of OpenClaw, formerly known as MoltBot and ClawdBot, by multiple hacking groups to deploy malicious payloads. OpenClaw, an open-source autonomous AI framework developed by Peter Steinberger, now at OpenAI, has become a high-severity target following its viral adoption in late January 2026. Its architecture grants significant system privileges, persistent memory access, […]