Cyber Security

Cyber Security
Cyber Security

Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices

hackers-leveraging-multiple-ai-services-to-compromise-600+-fortigate-devices

600+ FortiGate Devices Hacked A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries between January 11 and February 18, 2026. The campaign marks a defining demonstration of how AI is lowering the technical entry barrier to offensive cyber operations, enabling a low- […]

SuperClaw Open-Source Framework to Red-Team AI Agents for Security Testing

superclaw-open-source-framework-to-red-team-ai-agents-for-security-testing

Superagentic AI has released SuperClaw, an open-source, pre-deployment security testing framework built specifically for autonomous AI coding agents. Announced in late 2025, SuperClaw addresses a growing blind spot in enterprise AI adoption: agents are routinely deployed with broad tool access and high privileges, yet most organizations skip structured security validation entirely before going live. The […]

PayPal Data Breach Exposes SSNs and Business PII of Customers for Over Six Months

paypal-data-breach-exposes-ssns-and-business-pii-of-customers-for-over-six-months

PayPal Data Breach PayPal has issued a formal data breach notification disclosing that a coding error in its PayPal Working Capital (PPWC) loan application exposed the personally identifiable information (PII) of an undisclosed number of customers for approximately six months, from July 1, 2025, to December 13, 2025. The company detected the unauthorized exposure on […]

Grandstream VoIP Phones Vulnerability Allows Attackers to Gain Root Privileges

grandstream-voip-phones-vulnerability-allows-attackers-to-gain-root-privileges

VoIP desk phones are trusted devices, but many are managed like office furniture. A newly disclosed flaw in Grandstream phones shows how a simple network-facing bug can turn a handset into an entry point for eavesdropping and wider access. In a typical attack, the goal is not to break the phone or stop calls. The […]

CharlieKirk Grabber Stealer Attacking Windows Systems to Exfiltrate Login Credentials

charliekirk-grabber-stealer-attacking-windows-systems-to-exfiltrate-login-credentials

A new Python-based infostealer called CharlieKirk Grabber has been identified targeting Windows systems, with a focused goal of stealing stored login credentials, browser cookies, and session data. The malware is built to work as a “smash-and-grab” threat — it launches quickly, collects whatever sensitive data it can find, and disappears before the user notices anything […]

Hackers Using OAuth Apps in Microsoft Entra ID to Establish Persistence

hackers-using-oauth-apps-in-microsoft-entra-id-to-establish-persistence

Hackers Using OAuth Apps in Microsoft Entra ID Hackers are increasingly abusing OAuth applications in Microsoft Entra ID to gain persistent access, blending in as normal “business integrations” while keeping access even after defenders reset passwords. Recent Wiz research and incident reporting show attackers using fake OAuth apps, deceptive consent prompts, and redirect URLs to steal tokens […]

Adidas Investigates Alleged Data Breach 815,000 Records of Customer Data Stolen

adidas-investigates-alleged-data-breach-815,000-records-of-customer-data-stolen

Adidas has confirmed it is actively investigating a potential data breach involving one of its independent third-party partners after a threat actor operating under the alias “LAPSUS-GROUP” posted claims on BreachForums on February 16, 2026, alleging unauthorized access to the sportswear giant’s extranet portal. The actor, believed to be associated with the Scattered Lapsus$ Hunters […]

Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device

selective-thread-emulation-and-fuzzing-expose-dos-flaws-in-socomec-diris-m-70-iiot-device

Security researchers have uncovered six critical denial-of-service vulnerabilities in the Socomec DIRIS M-70 industrial gateway used for power monitoring and energy management in critical infrastructure. The flaws were discovered through an innovative emulation technique that bypassed hardware debugging limitations by focusing on a single thread handling Modbus protocol communications. The M-70 gateway facilitates data communication […]