How Ceros Gives Security Teams Visibility and Control Over Claude Code AI Agents
Ceros provides critical visibility and control over AI coding agents like Claude Code, addressing security gaps as these autonomous tools proliferate in enterprises
AI Browser Vulnerability Exposed: Perplexity's Comet Tricked Into Phishing Scam in Under Four Minutes
Security researchers successfully manipulated Perplexity's Comet AI browser into falling for phishing scams in under four minutes, exposing critical vulnerabilities.
Interlock Ransomware Exploits Critical Cisco FMC Zero-Day CVE-2026-20131 for Root Access
Amazon warns of active Interlock ransomware exploiting critical Cisco FMC zero-day CVE-2026-20131 (CVSS 10.0) for unauthenticated root access via insecure deserialization.
Marquis Ransomware Attack Exposes 672,000 Records, Disrupts 74 US Banks
Texas financial services provider Marquis reveals ransomware attack exposed 672,000 records and disrupted operations at 74 US banks, highlighting supply chain risks.
Please Don't Feed the Scattered Lapsus ShinyHunters: The Rise of a Ruthless Ransomware Gang
Scattered Lapsus ShinyHunters represents a dangerous evolution in ransomware tactics, combining traditional cyberattacks with real-world harassment and swatting
Kimwolf Botnet Infiltrates 2 Million IoT Devices in Critical Infrastructure Networks
Kimwolf botnet compromises 2M+ IoT devices in govt/corporate networks, enabling DDoS attacks & malicious traffic relay through sophisticated lateral movement.
International Law Enforcement Dismantles SocksEscort Botnet: 369,000 Compromised IPs Used for Global Cybercrime
International law enforcement dismantles SocksEscort botnet that compromised 369,000 IPs across 163 countries, enabling large-scale fraud through infected routers.
Unmasking Badbox 2.0: How Kimwolf Gang's Bragging Revealed the Android TV Botnet Operators
Kimwolf botnet operators accidentally exposed Badbox 2.0's Android TV streaming device botnet through bragging screenshots, giving FBI and Google new leads.
AI-Powered Attackers Outpace Patching: Bug Exploitation Now Top Google Cloud Attack Vector
AI empowers attackers to exploit cloud vulnerabilities faster than patching cycles, making bug exploitation the top Google Cloud attack vector, surpassing credential theft.
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
UNC6426 leveraged nx npm supply chain compromise to achieve complete AWS admin access within 72 hours, demonstrating devastating speed of modern cyberattacks.
GlassWorm Malware Campaign Hijacks GitHub Tokens to Poison Python Repositories
GlassWorm malware campaign exploits stolen GitHub tokens to inject malicious code into Python repositories, targeting Django, ML projects, and PyPI packages.
EU Implements Stricter Cybersecurity Standards for Automotive Industry Amid Rising Threats
EU introduces mandatory cybersecurity standards for automotive industry, requiring comprehensive risk management as connected vehicles face increasing threats.
Nordstrom's Email System Exploited in Sophisticated Cryptocurrency Scam Campaign
Cybercriminals exploited Nordstrom's legitimate email infrastructure to send cryptocurrency scam messages disguised as St. Patrick's Day promotions.