• Open

    PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
    Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
    The Nansh0u Campaign – Hackers Arsenal Grows Stronger
    In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
    Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
    In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.
    Threats Making WAVs - Incident Response to a Cryptomining Attack
    Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
    The Oracle of Delphi Will Steal Your Credentials
    Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.

  • Open

    Four security principles for agentic AI systems
    Agentic AI represents a qualitative shift in how software operates. Traditional software executes deterministic instructions. Generative AI responds to human prompts with output that humans review and use at their discretion. Agentic AI differs from both. Agents connect to software tools and APIs and uses large language models (LLMs) as reasoning engines to plan and […]  ( 112 min )
  • Open

    Chainalysis Links NYC 2026: AI Amplification, TradFi Convergence, and the Power of Networked Intelligence
    Chainalysis Links 2026 brought together the brightest minds across cryptocurrency exchanges, global law enforcement, and traditional finance (TradFi) for an… The post Chainalysis Links NYC 2026: AI Amplification, TradFi Convergence, and the Power of Networked Intelligence appeared first on Chainalysis.
    Chainalysis、初のブロックチェーン・インテリジェンス・エージェントを発表
    ※この記事は自動翻訳されています。正確な内容につきましては原文をご参照ください。 悪意のあるアクターはすでに AI を駆使し、詐欺、窃盗、マネーロンダリングを加速させています。対抗する側には、それを上回るスピードが求められます。 本日、イベント Links にて、Chainalysis の新たなステージとなる「ブロックチェーン・インテリジェンス・エージェント」を発表しました。新製品でも、後付けのチャットボット機能でもありません。数十億件のスクリーニング済みトランザクション、1,000 万件以上の捜査、10 年以上にわたるブロックチェーン分析で培った知見とプラットフォームの進化形であり、お客様のチームと連携して機能します。 ブロックチェーン分析を組織全体へ Chainalysis は、政府、金融機関、暗号資産事業者が捜査、規制対応、資産保護のために信頼を寄せる、世界で最も包括的なブロックチェーンデータセットを構築してきました。当社のデータは法廷で唯一信頼性を認められ、証拠として採用されています。そして当社のツールは、暗号資産史上最も重要な捜査を支えてきました。 しかし、その分析能力を最大限に活かすには、高度な専門スキルが求められていました。Chainalysis ブロックチェーン・インテリジェンス・エージェントは、プラットフォームの全機能、つまりデータ、製品、専門知識を組織内の誰もが活用できるようにします。熟練の捜査官やコンプライアンスアナリストから経営層まで、Chainalysis エージェントが的確なインサイトを提供し、チームの対応力を飛躍的に高めます。 すべてを支えるプラットフォーム 今、あらゆる企業が AI エージェントの開発に取り組んでいます。真の差別化要因は、その裏側にある基盤です。… The post Chainalysis、初のブロックチェーン・インテリジェンス・エージェントを発表 appeared first on Chainalysis.
  • Open

    Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach
    No content preview
  • Open

    Google Workspace’s continuous approach to mitigating indirect prompt injections
    Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications with multiple data sources, such as Workspace with Gemini. This technique enables the attacker to influence the behavior of an LLM by injecting malicious instructions into the data or tools used by the LLM as it completes the user’s query. This may even be possible without any input directly from the user. IPI is not the kind of technical problem you “solve” and move on. Sophisticated LLMs with increasing use of agentic automation combined with a wide range of content create an ultra-dynamic and evolving playground for adversarial attacks. That’s why Google takes a sophisticated and comprehensive approach to these attacks. We’re contin…
  • Open

    Threat actor abuse of AI accelerates from tool to cyberattack surface
    Generative AI is upgrading cyberattacks, from 450% higher phishing click‑through rates to industrialized MFA bypass. The post Threat actor abuse of AI accelerates from tool to cyberattack surface appeared first on Microsoft Security Blog.
    Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
    Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting environments. This post examines how this tradecraft conceals execution behind specially crafted HTTP cookies. The post Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments appeared first on Microsoft Security Blog.
  • Open

    OSDI '20 - AGAMOTTO: How Persistent is your Persistent Memory Application?
    No content preview
  • Open

    Journalist Sues FAA Over Drone No Fly Zone Designed to Prevent Filming ICE
    A Minnesota journalist is challenging a 3,000 foot restriction on flying near DHS assets on First Amendment grounds.
    Artemis II Astronauts Have ‘Two Microsoft Outlooks’ and Neither Work
    In space, no one can hear you scream at Microsoft’s legacy software.
    A Secure Chat App’s Encryption Is So Bad It Is ‘Meaningless’
    TeleGuard is an app downloaded more a million times that markets itself as a secure way to chat. The app uploads users’ private keys to the company’s server, and makes decryption of messages trivial.
  • Open

    Apple expands “DarkSword” patches to iOS 18.7.7
    Apple has quietly expanded patches against the vulnerabilities in the DarkSword exploit kit to include iOS and iPadOS 18.7.7
    Malwarebytes Privacy VPN receives full third-party audit
    We commissioned a third-party audit for the infrastructure behind our VPNs. Here are the results.
  • Open

    The Payload Podcast #005 - AI with Shane Caldwell
    No content preview
  • Open

    Basic Pentesting 0x01
    No content preview
    Pneak into the wonderful world of shortcuts in the Linux terminal
    No content preview
    Beyond Recon: Using AI for Real Exploitation in Pentesting
    No content preview
    CORS vs SOP: Why Your Browser Blocks Cross-Origin Requests (And When It Doesn’t)
    No content preview
    ContainMe — Command Injection, a SUID Binary, and Pivoting Through Two LXD Containers to Root |…
    No content preview
    DVWA COMMAND INJECTION (ALL LEVELS)
    No content preview
    Inside CVE-2024-4367: Arbitrary JavaScript Execution via PDF.js
    No content preview
    Domain Admin… and Beyond
    No content preview
    Enforcing Real-Time Cloud App Protection with Conditional Access and Defender for Cloud Apps
    No content preview
    Axios Just Got Weaponized — And Your npm install Pulled the Trigger
    No content preview

  • Open

    Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse
    An AI agent was banned from editing Wikipedia pages... and that's when things got weird, with the agent publishing its complaints publicly.
    WhatsApp on Windows users targeted in new campaign, warns Microsoft
    Microsoft warns WhatsApp on Windows users about an ongoing campaign that tries to gain permanent access to your machine
    Why we’re still not doing April Fools’ Day
    Scams are so convincing that two in three people can't tell them from the real thing. It's why we're not adding to the noise for April Fools.
  • Open

    Mitigating the Axios npm supply chain compromise
    On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages for version updates to download from command and control (C2) that Microsoft Threat Intelligence has attributed to the North Korean state actor Sapphire Sleet. Although the malicious versions are no longer available for download, since Axios is one of the most widely used HTTP clients in the JavaScript ecosystem, this compromise exposed hundreds to potentially millions of users. The post Mitigating the Axios npm supply chain compromise appeared first on Microsoft Security Blog.
  • Open

    Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control
    No content preview
    Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol
    No content preview
    Black Hat USA 2025 | Uncovering and Responding to the tj-actions Supply Chain Breach
    No content preview
  • Open

    Scientists Create Plant That Produces Ayahuasca, Shrooms, and Toad Psychedelics All At Once
    The proof-of-concept system produces psilocybin, DMT, and other compounds in leaves of the tobacco plant, potentially easing pressure on wild species and preserving Indigenous traditions.
    I Tried to Find the ‘Arousal Intelligence’ In An Animated, Augmented Reality Porn Star
    I spent some time with a new browser-based augmented reality porn app.
    Podcast: Inside the AI Slop Propaganda Wars
    Iran's AI and LEGO-focused propaganda; drama in the world of baseball; and perhaps one of the worst sex apps ever.
    ‘BLOCKADE’: The Right Is Using AI Content Scanners to Try to Supercharge Book Banning
    Groups that challenge books have begun using Gemini, ChatGPT, xAI, and other AI tools to try to get books banned.
  • Open

    Weekly Threat Bulletin – April 1st, 2026
    These are the top threats you should know about this week.
  • Open

    The Perils of Privatized Cyberwarfare
    In an essay for Lawfare, Citizen Lab director Ron Deibert warns that the Trump administration may authorize private firms to undertake offensive cyber operations with major consequences. The post The Perils of Privatized Cyberwarfare appeared first on The Citizen Lab.
  • Open

    How Managed Databases Are Transforming Today’s IT Landscape
    No content preview
    Digital Transformation in Africa: Security, Scale, and Control
    No content preview
  • Open

    SUCCESS - 253,510 breached accounts
    In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In SUCCESS' disclosure notice, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.

  • Open

    Black Hat USA 2025 | Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years
    No content preview
    Black Hat USA 2025 | More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA
    No content preview
    Black Hat Asia 2026 Welcome Video
    No content preview
  • Open

    New compliance guide available: ISO/IEC 27001:2022 on AWS
    We’re excited to announce the release of our latest compliance guide, ISO/IEC 27001:2022 on AWS, which provides practical guidance for organizations designing and operating an Information Security Management System (ISMS) using AWS services. As organizations migrate critical workloads to the cloud, aligning with globally recognized standards such as ISO/IEC 27001:2022 becomes an important step toward […]  ( 106 min )
    AWS Security Agent on-demand penetration testing now generally available
    AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, not only your most critical ones. This milestone transforms penetration testing from a periodic bottleneck into an on-demand capability that scales with your development velocity across AWS, Azure, GCP, other cloud-providers, and on-premises. With […]  ( 113 min )
  • Open

    Asking AI for personal advice is a bad idea, Stanford study shows
    AI chatbots, including ChatGPT, Claude, and Gemini, were all too willing to validate and hype up their users, a new Stanford study showed.
    Axios supply chain attack chops away at npm trust
    Developers using the axios package from npm may have downloaded a malicous version that drops a Remote Access Trojan
  • Open

    Paul McCartney Banned From Reddit After Promoting Himself in Paul McCartney Subreddit
    Reddit blamed a technical glitch for the removal of the living legend’s concert footage.
    How Thomson Reuters Powers ICE and Palantir
    Thomson Reuters’ data, which can include peoples’ addresses and details on their ethnicity, is linked to tools used by ICE.
  • Open

    AI Cyber Defense Ops Course Launch!
    No content preview
    HUGE npm axios supply chain attack
    No content preview
    🚨 NPM axios Supply Chain Attack 🚨
    No content preview
  • Open

    The threat to critical infrastructure has changed. Has your readiness?
    Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now. The post The threat to critical infrastructure has changed. Has your readiness? appeared first on Microsoft Security Blog.
    Applying security fundamentals to AI: Practical advice for CISOs
    Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today’s AI‑powered environment. The post Applying security fundamentals to AI: Practical advice for CISOs appeared first on Microsoft Security Blog.
    WhatsApp malware campaign delivers VBScript and MSI backdoors
    A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack leverages renamed Windows tools and cloud-hosted payloads to install MSI backdoors and maintain persistent access to compromised systems. The post WhatsApp malware campaign delivers VBScript and MSI backdoors appeared first on Microsoft Security Blog.
  • Open

    VRP 2025 Year in Review
    Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team 2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary 🎉🎉🎉! Originally started in 2010, our vulnerability reward program (VRP) has seen constant additions and expansions over the past decade and a half, clearly indicating the value the programs under this umbrella contribute to the safety and security of Google and its users, but also highlighting their acceptance by the external research community, without which such programs cannot function. Coming back to 2025 specifically, our VRP once again confirmed the ongoing value of engaging with the external security research community to make Google and its products safer. This was more eviden…
  • Open

    Chainalysis Introduces the First Blockchain Intelligence Agents
    Bad actors are already using AI to accelerate fraud, theft, money laundering, and more. We need to move fast to… The post Chainalysis Introduces the First Blockchain Intelligence Agents appeared first on Chainalysis.
  • Open

    Akamai Enterprise Application Access Achieves FedRAMP Moderate Authorization
    No content preview
  • Open

    Cuties AI - 144,250 breached accounts
    In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum. The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to the generated content. The data also included the account that created the content and a stated "preference" of either female or trans.

  • Open

    QBDI vs TritonDSE against a VM: who will be the fastest?
    In this blog, we present how QBDI and TritonDSE can be used to attack a complex C++ binary implementing a VM.
  • Open

    'You Can't Defeat the Robots!': Baseball's AI Strike Zone Is Must-Watch Television
    MLB's ABS system somehow feels extremely human. It's not human vs robot, it's human vs human as judged by a robot.
    An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned
    The incident is yet another example of volunteer Wikipedia editors fighting to keep the world’s largest repository of human knowledge free of AI-generated slop.
    The Journalist Who Tracked Epstein Island Visitors’ Phones (with Dhruv Mehrotra)
    This week Joseph talks to journalist and technologist Dhruv Mehrotra. Among many other things, Mehrotra tracked visitors to Epstein's island through location data.
  • Open

    Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio
    Agentic AI introduces new security risks. Learn how the OWASP Top 10 Risks for Agentic Applications maps to real mitigations in Microsoft Copilot Studio. The post Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio appeared first on Microsoft Security Blog.
  • Open

    From the Battlefield to the Blockchain: How Cryptocurrency Is Helping Finance the Drone Revolution
    TL;DR Low-cost, commercially available drones have become central to modern conflict, allowing state and non-state actors, such as pro-Russia militias… The post From the Battlefield to the Blockchain: How Cryptocurrency Is Helping Finance the Drone Revolution appeared first on Chainalysis.
    Chainalysis Supports Tempo with Automatic Token Coverage
    Chainalysis is excited to announce support for Tempo, an EVM-compatible Layer 1 blockchain purpose-built for stablecoin payments at scale. Tempo… The post Chainalysis Supports Tempo with Automatic Token Coverage appeared first on Chainalysis.
  • Open

    New macOS security feature will alert users about possible ClickFix attacks
    Apple introduced an extra layer of protection against ClickFix attacks, only for macOS Tahoe 26.4 and later
    A week in security (March 23 – March 29)
    A list of topics we covered in the week of March 23 to March 29 of 2026
  • Open

    # ClickForClickOnce - Generate Configurable Clickonce Payloads | Debjeet Banerjee
    No content preview

  • Open

    📖 [The CloudSecList] Issue 331
    📖 [The CloudSecList] Issue 331 was originally published by Marco Lancini at CloudSecList on March 29, 2026.

  • Open

    Scientists Discover Giant ‘Cavity’ Beyond Earth That Isn’t Supposed to Exist
    Earth’s magnetic field has created a huge void of galactic cosmic rays in space, which could help protect astronauts from radiation exposure.

  • Open

    How Microsoft Defender protects high-value assets in real-world attack scenarios
    High-value assets including domain controllers, web servers, and identity infrastructure are frequent targets in sophisticated attacks. Microsoft Defender applies asset-aware protection using Microsoft Security Exposure Management to detect and block threats against these critical systems. This article explores real-world attack scenarios and defense techniques. The post How Microsoft Defender protects high-value assets in real-world attack scenarios appeared first on Microsoft Security Blog.
  • Open

    Slopaganda and Sora, lol
    This week, we discuss touching grass and Sora's demise.
    Iran Is Winning the AI Slop Propaganda War
    “White House videos—AI or otherwise—are like group-chat in-jokes aimed at keeping cohesion.”
  • Open

    Black Hat USA 2025 | Evaluating Autonomous Vehicle Resilience
    No content preview
  • Open

    Criminals are renting virtual phones to bypass bank security
    Not a real phone, but good enough to fool your bank. Researchers warn criminals are using virtual devices to bypass fraud checks.
    Bogus Avast website fakes virus scan, installs Venom Stealer instead
    A fake Avast scan tells you your PC is infected, then installs the malware that steals passwords, session data and crypto wallets.
  • Open

    Grimoire: Because Your Cloud Logs Shouldn't Be More Mysterious Than Actual Magic | Andrew Krug
    No content preview
  • Open

    Magento Polyshell — The Latest Magento Threat (APSB25-94)
    No content preview
    The Telnyx PyPI Compromise and the 2026 TeamPCP Supply Chain Attacks
    No content preview
    Extend Application Security Visibility from Code to Runtime
    No content preview
  • Open

    英国政府が Xinbi を制裁:中国語圏の暗号資産詐欺を支えるインフラの中核を指定
    ※この記事は自動翻訳されています。正確な内容につきましては原文をご参照ください。 要約 英国外務・英連邦・開発省(FCDO)が中国語圏の主要な不正担保マーケットプレイス Xinbi を制裁指定。個別の加害者のみを対象とする従来の手法から、大規模詐欺エコシステムを支える金融「担保プラットフォーム」そのものに切り込む戦略的転換 Chainalysis のデータによると、Xinbi は 2021 年から 2025 年にかけて 199 億ドル超の決済を仲介。「Black U」マネーロンダリング、無許可 OTC 取引、個人情報データベース販売、詐欺インフラの提供など、あらゆる不正取引を仲介 FCDO はグローバル人権制裁制度に基づき Xinbi… The post 英国政府が Xinbi を制裁:中国語圏の暗号資産詐欺を支えるインフラの中核を指定 appeared first on Chainalysis.
  • Open

    BreachForums Version 5 - 339,778 breached accounts
    In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.

  • Open

    Preparing for agentic AI: A financial services approach
    Deploying agentic AI in financial services requires additional security controls that address AI-specific risks. This post walks you through comprehensive observability and fine-grained access controls—two critical capabilities for maintaining explainability and accountability in AI systems. You will learn seven design principles and get implementation guidance for meeting regulatory requirements while deploying secure AI solutions. Financial […]  ( 112 min )
  • Open

    Black Hat USA 2025 | Windows Hell No for Business
    No content preview
    Black Hat USA 2025 | Use and Abuse of Personal Information -- Politics Edition
    No content preview
  • Open

    Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
    A new macOS infostealer, NukeChain (now Infiniti Stealer), uses fake CAPTCHA pages to trick users into running malicious commands.
    GlassWorm attack installs fake browser extension for surveillance
    It hides inside developer tools, then monitors activity and steals data, turning a single infection into a wider risk across the supply chain.
    Landmark verdicts put Meta’s “addiction machine” platforms on trial
    Courts are starting to question how platforms are built, not just what’s posted.
  • Open

    Chainalysis Extends Sui Support with Automatic Token Support
    Chainalysis is excited to announce extended support for Sui, an emerging high-performance blockchain that has rapidly grown its ecosystem since… The post Chainalysis Extends Sui Support with Automatic Token Support appeared first on Chainalysis.
    UK Government Designates Xinbi, Key Node in Chinese-Language Crypto-Enabled Scam Infrastructure
    TL;DR The UK’s Foreign, Commonwealth and Development Office (FCDO) has designated Xinbi, a major Chinese-language illicit guarantee marketplace. The designation… The post UK Government Designates Xinbi, Key Node in Chinese-Language Crypto-Enabled Scam Infrastructure appeared first on Chainalysis.
  • Open

    Mile High 2026 | Sponsor Interview Compilation
    No content preview
  • Open

    strongSwan CVE-2026-25075: Integer Underflow in VPN Authentication
    Bishop Fox researchers took a deep dive into a new strongSwan vulnerability that allows unauthenticated attackers to take VPN services offline. We created an easy tool to test your strongSwan deployment & recommend upgrading to version 6.0.5 and later.
  • Open

    Scuf Gaming - 128,683 breached accounts
    In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
    Sound Radix - 292,993 breached accounts
    In March 2026, the audio production tools company Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP. The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exposed, and that no financial or credit card information was impacted.

  • Open

    Black Hat USA 2025 | Smart Charging, Smarter Hackers: The Unseen Risks of ISO 15118
    No content preview
  • Open

    In WAF we (should not) trust
    Deep dive into Web Application Firewall (WAF) bypasses, from misconfiguration exploitation to crafting obfuscated payloads. We show the impact of the parsing discrepancy between how a WAF reads a request and how a backend executes it. It is not a bug, it is a feature.
  • Open

    Weekly Threat Bulletin – March 25th, 2026
    These are the top threats you should know about this week.
  • Open

    Hackers claim to have accessed data tied to millions of crime tipsters
    A hacktivist group claims to have obtained sensitive data on crime tipsters and the people they reported, dating back to 1987.
    New FCC router ban could leave home networks less secure
    The FCC announced a ban on routers made outside the US, but it could backfire. Here’s the real risk, and what you can do about it.
    Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw
    We talked to Khaled Mohamed on going from script kiddie to bug bounty hunter, and the moment he uncovered a flaw in Microsoft Authenticator.
  • Open

    Identity security is the new pressure point for modern cyberattacks
    Read the latest Microsoft Secure Access report for insights into why a unified identity and access strategy offers strong modern protection. The post Identity security is the new pressure point for modern cyberattacks appeared first on Microsoft Security Blog.
    Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
    Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide. This analysis walks through the Trivy supply‑chain compromise, attacker techniques, and concrete steps security teams can take to detect and defend against similar attacks. The post Guidance for detecting, investigating, and defending against the Trivy supply chain compromise appeared first on Microsoft Security Blog.
  • Open

    Netanyahu Posts ‘Proof of Life’ Video: AI Sows Doubts About What’s Real
    Senior researcher Alberto Fittarelli spoke with the New York Times about the double threat of AI-produced disinformation. The post Netanyahu Posts ‘Proof of Life’ Video: AI Sows Doubts About What’s Real appeared first on The Citizen Lab.
  • Open

    Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
    Posted by Eric Lynch, Product Manager, Android and Dom Elliott, Group Product Manager, Google Play Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve "impossible" problems in drug discovery, materials science, and energy—tasks that even the most powerful classical supercomputers cannot handle. However, the same unique ability to consider different options simultaneously also allows these machines to bypass our current digital locks. This puts the public-key cryptography we’ve relied on for decades at risk, potentially compromising everything from bank transfers to trade secrets. To secure our future, it is vital to adopt the new Post-Quantum Cryptography (PQC) standards National Institute of Standards and Technology (NIST) is urging…
  • Open

    Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation
    Akamai Guardicore Segmentation, a Leader and Fast Mover in the 2026 GigaOm Radar for Microsegmentation report, balances innovation with platform strength.
    Machine Learning Operations: Yesterday, Today, and Tomorrow
    No content preview

  • Open

    Black Hat Asia 2026 Speaker Spotlight - Tal Be'ery
    No content preview
  • Open

    FBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts
    The FBI and CISA join European agencies in warning of a widespread, easily scalable social engineering campaign targeting messaging apps.
    Scam compounds hiring “AI models” to seal the deal in deepfake video calls
    Forced labor doesn’t play well on camera, so scam compounds are hiring women to deepfake their faces on video calls.
  • Open

    Chainalysis Joins Solana Developer Platform to Bring Real-Time Compliance to Every Builder
    Chainalysis is proud to be a compliance partner for Solana Developer Platform (SDP), integrating Chainalysis KYT (Know Your Transaction) directly… The post Chainalysis Joins Solana Developer Platform to Bring Real-Time Compliance to Every Builder appeared first on Chainalysis.
  • Open

    Microsegmentation and Zero Trust: Control the Blast Radius by Design
    No content preview

  • Open

    RuneScape Boards - 222,762 breached accounts
    In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data. The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
  • Open

    IAM policy types: How and when to use them
    June 3, 2022: Original publication date of this post. This post has been updated to add the additional IAM policy types: Resource control policies. You manage access in AWS by creating policies and attaching them to AWS Identity and Access Management (IAM) principals (roles, users, or groups of users) or AWS resources. AWS evaluates these […]  ( 119 min )
  • Open

    Black Hat USA 2025 | HTTP/1.1 Must Die! The Desync Endgame
    No content preview
    Black Hat USA 2025 | "Dead Pixel Detected" - A Security Assessment of Apple's Graphics Subsystem
    No content preview
  • Open

    FriendlyDealer mimics official app stores to push unvetted gambling apps
    Think you’re downloading from Google or Apple? 1,500+ fake app store sites look like the real thing, but push unvetted, cloned web-based casino apps.
  • Open

    Farming at the Edge: Where Autonomous Robots and Edge Compute Meet
    No content preview
  • Open

    Canadians Will Face ‘Tsunami’ of Transnational Repression in Coming Years
    On March 23, Citizen Lab director Ron Deibert will appear before the House of Commons to testify on transnational repression.  The post Canadians Will Face ‘Tsunami’ of Transnational Repression in Coming Years appeared first on The Citizen Lab.

  • Open

    The Resolv Hack: How One Compromised Key Printed $23 Million
    On March 22, 2026, the Resolv DeFi protocol became the latest example of how quickly things can unravel in DeFi… The post The Resolv Hack: How One Compromised Key Printed $23 Million appeared first on Chainalysis.
  • Open

    Black Hat USA 2025 | Peril at the Plug: Investigating EV Charger Security and Safety Failures
    No content preview
  • Open

    📖 [The CloudSecList] Issue 330
    📖 [The CloudSecList] Issue 330 was originally published by Marco Lancini at CloudSecList on March 22, 2026.

  • Open

    Archaeologist of the Dark Web - Because Manual Dark Web OSINT is So Last Season | Apurv Singh Gautam
    No content preview
  • Open

    ChatGPT For The Dark Web
    No content preview
    State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
    No content preview
  • Open

    CVE-2026-31979: The Symlink Trap — Root Privilege Escalation in Himmelblau
    No content preview

  • Open

    Intego X9: Never trust my updates
    This blog post dives into the most common classes of macOS Local Privilege Escalation vulnerabilities, from insecure XPC communications and time-of-check to time-of-use (TOCTOU) Race Conditions to a range of implementation and configuration oversights. We will explore how attackers can exploit these weaknesses to escalate privileges, and highlight real-world examples to illustrate recurring patterns. This post ends the series on Intego products on macOS by revealing vulnerabilities that can lead to Local Privilege Escalation, as well as a surprise bonus.
  • Open

    Akamai Helps Authorities Disrupt the World’s Largest IoT Botnets
    The U.S. DOJ recently disrupted several large and powerful DDoS botnets and shut down their related DDoS-for-hire services with Akamai’s help.
    The Top 10 Threats Related to Agent Skills
    Read about the top 10 critical threats related to Agent Skills that security teams should consider while building and evaluating agents.

  • Open

    Italian Prosecutors Confirm Journalist Was Hacked with Paragon Spyware
    Italian prosecutors have confirmed the hacking of journalist Francesco Cancellato, who was alerted of a suspected attack last year. The post Italian Prosecutors Confirm Journalist Was Hacked with Paragon Spyware appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – March 18th, 2026
    These are the top threats you should know about this week.
  • Open

    Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
    Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device, which was disclosed by Cisco on March 4, 2026. After Cisco’s disclosure, Amazon threat […]  ( 113 min )
  • Open

    Bloodhound OpenGraph
    No content preview
    BIG DAY TODAY
    No content preview
    BIG DAY TODAY
    No content preview
  • Open

    Aura - 903,080 breached accounts
    In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers, physical and IP addresses, and customer service notes. Aura advised that no Social Security numbers, passwords or financial information were compromised.

  • Open

    AWS completes the second GDV community audit with participant insurers in Germany
    We’re excited to announce that Amazon Web Services (AWS) has completed its second GDV (German Insurance Association) community audit with 36 members from the Germany insurance industry participating, corresponding to over 63% coverage of the German market in terms of insurance premiums. Community audits are an efficient method to provide additional assurance to a group […]  ( 107 min )
  • Open

    Submission to the OHCHR: Protecting Human Rights Defenders in the Digital Age
    The Citizen Lab has submitted an input on digital transnational repression to the OHCHR report on ‘Protecting Human Rights Defenders in the Digital Age’. The post Submission to the OHCHR: Protecting Human Rights Defenders in the Digital Age appeared first on The Citizen Lab.
  • Open

    Join Us at Wasm I/O 2026
    Akamai is sponsoring Wasm IO 2026 as part of our commitment to WebAssembly. Get all the details.
    The Agentic Security Crisis: Why You Need to Act Now
    No content preview
    Apps, APIs, and DDoS 2026: The Industrialization of Cyberattack Campaigns
    No content preview
  • Open

    can AI eat its own tail? 🤖
    No content preview
    new phone who dis?
    No content preview
  • Open

    Accidental Engineer: Building My First Hardware Tool the Hard Way
    I set out to build a rugged badge-cloning tool for field use, with zero hardware background. This is the story of learning electrical engineering from scratch, navigating bad assumptions, and discovering that curiosity, persistence, and hands-on testing can take you further than you think.

  • Open

    Build your Sh*tty Add-On With KiCad For Your Electronic Badges! | Adrien Lasalle
    No content preview
  • Open

    Akamai and Google: Advancing Data-Driven Marketing with Google Tag Gateway for Advertisers
    No content preview
    Secure the AI Factory: Data Center Security for Accelerated Intelligence
    No content preview

  • Open

    Divine Skins - 105,814 breached accounts
    In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach. The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email addresses and usernames. The data also contained a history of purchases made by users.
    Baydöner - 1,266,822 breached accounts
    In March 2026, the Turkish restaurant chain Baydöner suffered a data breach which was subsequently published to a public hacking forum. The incident exposed over 1.2M unique email addresses along with names, phone numbers, cities of residence and plaintext passwords. A small number of records also included Turkish national ID number and date of birth. In their disclosure notice, Baydöner stated that payment and financial data was not affected.
  • Open

    📖 [The CloudSecList] Issue 329
    📖 [The CloudSecList] Issue 329 was originally published by Marco Lancini at CloudSecList on March 15, 2026.

  • Open

    Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center
    If your organization relies on AWS IAM Identity Center for workforce access, you can now extend that access across multiple AWS Regions with multi-Region replication. Previously, AWS access portal was only available in one Region, when you add an additional Region, users get an active access portal endpoint there. If the primary Region experiences a […]  ( 117 min )

  • Open

    GDIOCSpider - Extracting and Identifying IOCs from the GDriveverse | Noah Dunn
    No content preview
  • Open

    NahamSec Teaches Me Bug Bounty Basics
    No content preview
  • Open

    Winning CTFs: A Proving Ground at HackMex & Ekoparty
    CTF competitions push offensive security skills to their limits. In 2025, the Bishop Fox Mexico team claimed first place at both HackMex Finals and EkoParty Red Team Space. Discover how the team navigated web exploitation, infrastructure compromise, and AWS attack paths to win.
  • Open

    AI in Vulnerability Discovery: A Call for Human Oversight and Caution
    No content preview
    Fortify Your Network Security from Emerging Geopolitical Cyberthreats
    No content preview

  • Open

    Looking at the SmarterMail API Vulnerability CVE-2026-24423
    Sensor Intel Series: February 2026 CVE Trends
  • Open

    OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract
    Senior researcher Wolfie Christl spoke with Forbes about OpenAI's deal with the Pentagon that permits the gathering of bulk data from users. The post OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract appeared first on The Citizen Lab.
    The Market for Spyware is Growing: It’s Used Differently Against Women
    Senior researcher and co-author of the report, Noura Aljizawi, speaks to the Fuller Project about the ways gender is weaponized to silence women.  The post The Market for Spyware is Growing: It’s Used Differently Against Women appeared first on The Citizen Lab.
  • Open

    RSAC 2026: Tag in a Partner for the AI Security Showdown
    Legacy security wasn't built for autonomous AI. See how Akamai partners are stepping into the ring to build trust and secure the agentic enterprise.
    Build Serverless Functions with Zero Cold Starts: WebAssembly and Spin
    No content preview
  • Open

    How to manage the lifecycle of Amazon Machine Images using AMI Lineage for AWS
    As organizations scale their cloud infrastructure, maintaining proper lifecycle management of Amazon Machine Images (AMIs) is a critical component of their security and risk management goals. AMIs provide the essential information required to launch Amazon Elastic Compute Cloud (Amazon EC2) instances, however; they present security and compliance challenges if not tracked and managed throughout their […]  ( 117 min )
  • Open

    Announcing Pwn2Own Berlin for 2026
    If you just want to read the contest rules, click here.   Willkommen zurück, meine Damen und Herren, zu unserem zweiten Wettbewerb in Berlin! That’s correct (if Google translate didn’t steer me wrong). After our inaugural competition last year, Pwn2Own returns to Berlin and OffensiveCon. Outside of our shipping troubles, we had an amazing time and can’t wait to get back. Last year, we added Artificial Intelligence as a category with great results. This year, we’re expanding this and splitting it into multiple different categories: AI Databases, Coding Agents, Local Inferences, and a separate category for NVIDIA products. In last year’s contest, NVIDIA targets had wins, losses, and collisions, so it will be interesting to see how they fare this year. The folks from AWS wanted to get into th…

  • Open

    A Nerd's Life: Weeks of Firmware Teardown to Prove We Were Right
    In a blog post published last December, we demonstrated how we managed to extract the firmware from a smartwatch by exploiting an out-of-bounds read vulnerability and spying on its screen interface. Follow us on our long and unexpected journey to figure out how this smartwatch can measure heart rate or blood pressure with no visible sensor, the problems we encountered while analyzing its firmware, and how we solved them to uncover The Truth about this device.
  • Open

    Weekly Threat Bulletin – March 11th, 2026
    These are the top threats you should know about this week.
  • Open

    GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
    No content preview
  • Open

    Inside Akamai: How Offload and Performance Drive Speed and Resiliency
    No content preview
    The Mistral–Koyeb Deal and the Shift Toward Architectural Maturity in AI
    No content preview

  • Open

    PageJack in Action: CVE-2022-0995 exploit
    PageJack is a Linux kernel exploitation technique useful to generate a Use After Free (UAF) in the page allocator. In this article we provide a detailed example of how to use it to exploit a Linux kernel vulnerability from 2022.
  • Open

    AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications
    In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located within the European Union (EU), and physically and logically separate from all other AWS Regions. The unique approach of the AWS European Sovereign Cloud provides the only fully featured, independently operated sovereign cloud […]  ( 109 min )
    Security is a team sport: AWS at RSAC 2026 Conference
    The RSAC 2026 Conference brings together thousands of professionals, practitioners, vendors, and associations to discuss issues covering the entire spectrum of cybersecurity—a place where innovation meets collaboration and the industry’s brightest minds converge to shape its future. This March, Amazon Web Services (AWS) returns to the annual RSAC Conference in San Francisco to share how […]  ( 108 min )
    AWS Security Hub is expanding to unify security operations across multicloud environments
    After talking with many customers, one thing is clear: the security challenge has not gotten easier. Enterprises today operate across a complex mix of environments, including on-premises infrastructure, private data centers, and multiple clouds, often with tools that were never designed to work together. The result is enterprise security teams spend more time managing tools […]  ( 107 min )
  • Open

    The March 2026 Security Update Review
    I am back in the friendly confines of the Mid-South headquarters of TrendAI ZDI (a.k.a. my home office), and am all set for the third patch Tuesday of 2026. Take a break from your regularly scheduled activities and let’s take a look at the latest security patches from Adobe and Microsoft.If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for March 2026 For March, Adobe released eight bulletins addressing 80 unique CVEs in Adobe Acrobat Reader, Commerce, Illustrator, Substance 3D Painter, Premier Pro, Experience Manager, Substance 3D Stager, and the Adobe DNG Software Development Kit (SDK). Two of these bugs were submitted through the TrendAI ZDI program. If you need to prioritize, the update for Acrobat likely has the most impac…
  • Open

    Build Transformative Security with AI-Powered WAF Detections
    No content preview
    Avoid Evasive Scraping with Stronger Content Protection
    Learn about the enhancements to Akamai Content Protector that stop evasive scraping across web and mobile while minimizing user friction and false positives.

  • Open

    Hunting for Stupid | Mary Ellen Kennel
    No content preview
  • Open

    An Interview with Allie Mellen (author: CODE WAR)
    No content preview
  • Open

    Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643
    FortiClient EMS 7.4.4 contains a pre-authentication SQL injection vulnerability (CVSS 9.1) in its multi-tenant site routing middleware. An unauthenticated attacker can inject arbitrary SQL by sending a crafted Site HTTP header to any pre-auth endpoint.
  • Open

    Role-Based Access Control (RBAC) Now Available in Akamai Cloud
    No content preview

  • Open

    📖 [The CloudSecList] Issue 328
    📖 [The CloudSecList] Issue 328 was originally published by Marco Lancini at CloudSecList on March 08, 2026.

  • Open

    Hardware Hacking 101: with a custom physical kit!
    No content preview

  • Open

    N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras
    No content preview

  • Open

    Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal
    A Greek court sentenced four Intellexa executives to prison for their role in a 2022 scandal that involved the use of Predator spyware against more than 90 public figures in the country. Citizen Lab researchers first published evidence of Predator spyware in Greece in late 2021. The Lab later analyzed the phones of journalist Thanasis […] The post Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal appeared first on The Citizen Lab.
  • Open

    CASI Leaderboard Shifts: Sugar-Coated Poison, and the Expanding AI Attack Surface
    AI Security Insights – March 2026
  • Open

    AWS completes the 2026 annual Dubai Electronic Security Centre (DESC) certification audit
    We’re excited to announce that Amazon Web Services (AWS) has completed the annual Dubai Electronic Security Centre (DESC) certification audit to operate as a Tier 1 Cloud Service Provider (CSP) for the AWS Middle East (UAE) Region. This alignment with DESC requirements demonstrates our continued commitment to adhere to the heightened expectations for CSPs. Government […]  ( 106 min )
    2025 ISO and CSA STAR certificates are now available with one additional service and one new region
    Amazon Web Services (AWS) successfully completed the annual recertification audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. The objective of the audit was to enable AWS to expand their ISO and CSA STAR certifications to include one new AWS […]  ( 106 min )
  • Open

    How Harmonic Proved High-Performance AI Inference on Akamai GPUs
    Find out how Harmonic achieved high-performance AI inference on Akamai Cloud with NVIDIA Blackwell GPUs, optimizing for speed and efficiency.

  • Open

    Bypassing debug password protection on the RH850 family using fault injection
    This blogpost explains how we bypassed the 16-byte password protection of the debug on several variants of the RH850 family using voltage fault injection.
  • Open

    From Harm to Justice: Ending Violence Against Women in the Public Sphere in the OSCE Region
    On March 10, Citizen Lab senior researcher Noura Aljizawi will participate in an OSCE panel titled “From Harm to Justice: Ending Violence Against Women in the Public Sphere in the OSCE Region.”  Women who stand at the forefront of efforts to advance gender equality often face severe backlash for their public engagement, impacting individual rights […] The post From Harm to Justice: Ending Violence Against Women in the Public Sphere in the OSCE Region appeared first on The Citizen Lab.
  • Open

    Security-driven Rapid Release - Pwn2Own Documentary (Part 4)
    No content preview
  • Open

    Enhanced access denied error messages with policy ARNs
    To help you troubleshoot access denied errors, we recently added the Amazon Resource Name (ARN) of the denying policy to access denied error messages. This builds on our 2021 enhancement that added the type of the policy denying the access to access denied error messages. The ARN of the denying policy is only provided in […]  ( 107 min )
2026-04-03T02:27:48.876Z osmosfeed 1.15.1