Claude Desktop Reportedly Adds Browser Access Bridge to Multiple Chromium-Based Browsers

A recent technical audit by privacy researcher Alexander Hanff has revealed that Anthropic’s Claude Desktop application for macOS silently installs a Native Messaging bridge into the directories of several Chromium-based browsers. This undocumented behavior occurs without user consent, raising significant privacy and security concerns within the cybersecurity community. When a user installs Claude Desktop (Claude.app), […]
Xiongmai IP Camera Vulnerability Let Attackers Bypass Authentication and have Remote Access

Security cameras are designed to keep commercial facilities safe. However, a newly disclosed critical vulnerability in Hangzhou Xiongmai Technology’s XM530 IP Cameras is putting networks at risk. Tracked under the alert code ICSA-26-113-05 and officially designated as CVE-2025-65856, this flaw allows cybercriminals to bypass authentication entirely. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued […]
Hackers Leverage Microsoft Teams to Breach Organizations Posing as IT Helpdesk Staff

A newly identified threat group, UNC6692, has been caught running a sophisticated multistage intrusion campaign that uses Microsoft Teams impersonation, a custom modular malware suite, and cloud infrastructure abuse to deeply penetrate enterprise networks, all without exploiting a single software vulnerability. Google Threat Intelligence Group (GTIG) and Mandiant researchers disclosed the campaign on April 22, […]
North Korean Hackers Use Fake IT Worker Scheme to Infiltrate Companies and Evade Sanctions

North Korea has been running one of the most quietly effective cyber fraud operations in recent years. State-sponsored operatives working for the Pyongyang regime have been posing as legitimate remote IT workers to get hired by companies around the world, earning salaries that flow directly back to fund the country’s weapons programs. This scheme, active […]
Microsoft Teams Rolls Out Efficiency Mode to Optimize Performance on Low-End Devices

Microsoft is set to introduce Efficiency Mode in Microsoft Teams, a performance-enhancing feature designed to improve app responsiveness and meeting quality on hardware-constrained devices. The rollout begins in early May 2026 and is expected to be completed by mid-May 2026, with the feature linked to Microsoft 365 Roadmap ID 560055. Efficiency Mode is a performance-optimized […]
Checkmarx KICS Official Docker Repo Compromised to Inject Malicious Code

A significant supply chain attack targeting the official checkmarx/kics Docker Hub repository, where threat actors pushed trojanized images capable of harvesting and exfiltrating sensitive developer credentials and infrastructure secrets. Docker’s internal monitoring flagged suspicious activity around KICS image tags on April 22, 2026, and promptly alerted Socket researchers. The investigation revealed that attackers had overwritten […]
Cybercriminals Exploit French Fintech Accounts to Move Stolen Money Before Detection

Organized fraud networks are now using a new method to move stolen money in France. They create fake business accounts on freelancer fintech platforms and use those accounts as mule accounts to launder funds quickly, often before anyone can trace the money. This is not a simple scam by one bad actor. It is a […]
Compromised Namastex npm Packages Deliver TeamPCP-Style CanisterWorm Malware

A serious supply chain threat has surfaced in the npm ecosystem. Malicious versions of packages belonging to Namastex.ai have been found carrying CanisterWorm malware, a self-propagating backdoor that mirrors the attack style of the threat actor known as TeamPCP. The attack silently replaces legitimate package contents with infected code and continues spreading across every namespace […]
Unauthorized Group Gains Access to Anthropics Exclusive Cyber Tool Mythos

A group of unauthorized users has reportedly breached access controls surrounding Claude Mythos Preview, Anthropic’s powerful and closely guarded AI-driven cybersecurity tool, raising serious concerns about third-party vendor security and the risks of placing advanced offensive AI capabilities in the wrong hands. Announced on April 7, 2026, Claude Mythos Preview is an AI model that […]
Gentlemen RaaS Attacking Windows, Linux With additional locker written in C for ESXi

A new ransomware-as-a-service (RaaS) operation known as “The Gentlemen” has emerged as a serious threat to corporate networks worldwide. Since appearing around mid-2025, this group has rapidly grown into a well-organized criminal platform, publicly claiming over 320 victims, with most attacks — more than 240 — recorded in the opening months of 2026. The speed […]