top of page
ALL POSTS
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
Key Findings Comet Browser has implemented a hidden MCP API (chrome.perplexity.mcp.addStdioServer) that allows its embedded extensions to execute arbitrary local commands on users' devices, a capability that traditional browsers explicitly prohibit. The MCP API is currently found in the Agentic extension and can be triggered by the perplexity.ai page, creating a covert channel for Comet to access local data and launch commands/apps without user consent. There is limited offic
Nov 19, 20253 min read
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
Key Findings: Seraphic, the leader in enterprise browser security (SEB) and AI enablement, announced native protection for Electron-based applications. Seraphic is the first and only browser security platform to introduce this capability. Seraphic's technology operates at the core of the browser, enabling it to secure any AI-powered browser and Electron app. Background Seraphic transforms any traditional or AI browser into a secure enterprise browser, delivering real-time pro
Nov 19, 20252 min read
CredShields and Checkmarx Collaborate to Enhance Smart Contract Security in Enterprise AppSec
Key Findings CredShields, a leading Web3 security firm, has partnered with Checkmarx, the global leader in agentic AI-powered application security testing. The collaboration aims to bring Web3 security expertise to Checkmarx's enterprise application security platform, addressing the growing need for decentralized security solutions. The partnership will focus on comprehensive security coverage for decentralized applications, smart contracts, and wallets, as well as AI-assiste
Nov 19, 20252 min read
Hackers Exploit Adspect Cloaking and Fake Crypto CAPTCHA in npm Supply Chain Attack
Key Findings Seven npm packages published by a threat actor using the alias "dino_reborn" were found to be part of a highly coordinated malware campaign The packages use Adspect-powered cloaking, anti-analysis JavaScript, and fake CAPTCHA interfaces to funnel unsuspecting victims toward malicious payloads while hiding their activity from security researchers The threat actor built an entire fake website to serve security researchers while real victims are redirected through a
Nov 19, 20252 min read
Critical Flowise Flaw Allows Unauthenticated Remote Access
Key Findings: Flowise, a popular open-source low-code workflow platform, contains a critical vulnerability allowing unauthenticated remote admin takeover. The vulnerability is due to an exposed registration endpoint that can be exploited to gain full administrative control of the Flowise instance. No authentication is required to leverage this flaw, making it trivial for attackers to gain complete control of affected systems. The vulnerability has been assigned the CVE identi
Nov 18, 20252 min read
Cloudflare Outage Jolts the Internet: What Happened, and Who Was Affected
Key Findings: Cloudflare, a major web infrastructure company that handles an estimated 20% of global web traffic, experienced a service disruption on November 18, 2025. The disruption caused errors and inaccessibility for a wide range of websites and online services, including Hackread.com, Canva, Uber, IKEA, Shopify, League of Legends, DoorDash, Discord, Patreon, Medium, Crunchyroll, GitLab, Udemy, and popular AI tools like ChatGPT. The root cause was a latent bug triggered
Nov 18, 20252 min read
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2027
Key Findings The cybercriminal supply chain continues to transform, with new specialized roles emerging to enable cybercrime at scale. Threat actor communities will fragment, evolve, and get younger, with an influx of teen cybercriminals using plug-and-play attack kits. The non-human identity (NHI) explosion will fuel hidden risks, as machine credentials proliferate across cloud environments with less protection than human-based credentials. Insider threats will be fueled by
Nov 18, 20253 min read
Microsoft Blocks Massive 15.72 Tbps DDoS Attack from AISURU Botnet
Key Findings Microsoft disclosed that it automatically detected and mitigated a 15.72 Tbps DDoS attack, the largest ever observed in the cloud, targeting a single endpoint in Australia. The attack originated from the AISURU botnet, a Mirai-class IoT botnet powered by nearly 300,000 infected devices, mainly routers, security cameras, and DVR systems. The attack involved massive UDP floods from over 500,000 source IPs across various regions, with minimal spoofing and random sou
Nov 18, 20252 min read
Google Addresses Critical Chrome Vulnerability Actively Exploited in the Wild
Key Findings Google released security updates for Chrome to address two security flaws, including one that is being actively exploited in the wild. The actively exploited vulnerability is CVE-2025-13223, a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could lead to arbitrary code execution or program crashes. Clément Lecigne of Google's Threat Analysis Group (TAG) discovered and reported the flaw on November 12, 2025. Google has not provided de
Nov 18, 20252 min read
Dragon Breath APT Utilizes RoningLoader, Employs Kernel Driver and PPL Abuse to Disable Windows Defender
Key Findings The Dragon Breath APT group (APT-Q-27) has deployed a new multi-stage malware loader called RoningLoader to target Chinese-speaking users. The campaign uses trojanized installers masquerading as trusted applications like Google Chrome and Microsoft Teams. RoningLoader exhibits sophisticated evasion and defense bypass techniques, including: Abuse of Protected Process Light (PPL) to disable Windows Defender Leveraging a legitimate, signed kernel driver to terminate
Nov 17, 20252 min read
Alice Blue Partners with AccuKnox for Regulatory Compliance and Cybersecurity
Key Findings Alice Blue, a prominent brokerage and financial services firm, has partnered with AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), to strengthen its security and compliance frameworks across on-prem and cloud workloads. The partnership was executed through channel partner Airowire. Leveraging AccuKnox's security capabilities, Alice Blue aims to achieve enhanced visibility, automated compliance, and continuous protecti
Nov 17, 20252 min read
Multiple Vulnerabilities in GoSign Desktop lead to Remote Attacks
Key Findings GoSign Desktop, a widely used electronic signature solution, contains critical vulnerabilities that can lead to remote code execution and privilege escalation. The platform disables TLS certificate validation when configured to use a proxy server, exposing users to man-in-the-middle attacks. The update mechanism relies on an unsigned manifest, allowing an attacker to deliver malicious updates and fully compromise the machine. Sensitive data, such as OAuth secrets
Nov 16, 20252 min read
RondoDox Exploits Unpatched XWiki Servers to Pull ... - Cybrr
Key Findings: RondoDox botnet malware is targeting unpatched XWiki instances to exploit a critical remote code execution vulnerability (CVE-2025-24893). The vulnerability, with a CVSS score of 9.8, allows any guest user to execute arbitrary code through a request to the "/bin/get/Main/SolrSearch" endpoint. The flaw was patched by XWiki in versions 15.10.11, 16.4.1, and 16.5.0RC1 released in late February 2025. Evidence shows the vulnerability has been exploited in the wild si
Nov 16, 20252 min read
Anthropic: China-Backed Hackers Unleash First Large-Scale Autonomous AI Cyberattack
Key Findings China-linked threat actors used Anthropic's AI system, Claude, to automate and execute a sophisticated espionage campaign in September 2025. The cyberspies leveraged advanced "agentic" capabilities of the AI system, allowing it to act autonomously and perform a range of malicious activities with minimal human oversight. The attack targeted about 30 global organizations across tech, finance, chemicals, and government sectors, succeeding in a few cases. This incide
Nov 16, 20252 min read
Microsoft Unveils Open Xbox Game Publishing Guide
Key Findings Microsoft has made its internal Xbox Game Publishing Guide publicly available, previously accessible only to select partners. This move is expected to significantly lower the barrier for game developers, particularly independent creators, to bring their titles to the Xbox platform. The guide offers a comprehensive breakdown of the entire process required to publish a game within the Xbox ecosystem, covering every stage from pre-production to final release. Backgr
Nov 16, 20252 min read
Helping North Korean IT Workers Infiltrate US Firms
Key Findings: Five individuals have pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions. The five defendants are Audricus Phagnasay, Jason Salazar, Alexander Paul Travis, Oleksandr Didenko, and Erick Ntekereze Prince. The defendants facilitated the use of stolen U.S. identities by North Korean IT workers to secure jobs at American firms, hosted company-issued
Nov 15, 20252 min read
North Korean Hackers Weaponize JSON Services for Malware Distribution
Key Findings North Korean threat actors behind the Contagious Interview campaign have adopted a new tactic of using JSON storage services to host and deliver malware. The campaign involves approaching targets on professional networking sites under the pretext of a job assessment or project collaboration, instructing them to download a demo project hosted on platforms like GitHub, GitLab, or Bitbucket. In one such project, a file named "server/config/.config.env" contains a Ba
Nov 15, 20252 min read
Chinese Tech Firm Leak Reportedly Exposes State Linked Cyber Attacks
Key Findings: Major data leak from Chinese security firm Knownsec (aka Chuangyu) in November 2025, with over 12,000 secret files briefly appearing on GitHub. Leak provided a rare insight into China's government-backed hacking tools and operations. The data theft may have occurred as early as 2023, but the files were taken down quickly. Background Knownsec is a prominent player in China's cybersecurity industry, having received a significant investment from Tencent in 2015 and
Nov 15, 20251 min read
Serious AI Bugs Found Exposing Vulnerabilities in Meta, Nvidia, and Microsoft Inference Frameworks
Key Findings Cybersecurity researchers have uncovered critical remote code execution vulnerabilities in major AI inference engines, including those from Meta, Nvidia, Microsoft, and open-source projects like vLLM and SGLang. The vulnerabilities stem from the unsafe use of ZeroMQ (ZMQ) and Python's pickle deserialization, a pattern dubbed "ShadowMQ." The root cause is a vulnerability in Meta's Llama large language model (LLM) framework (CVE-2024-50050) that was patched by the
Nov 15, 20252 min read
Chinese Hackers Exploit Anthropic AI to Orchestrate Automated Cyber Attacks
Key Findings Chinese state-sponsored hackers successfully used Anthropic's AI coding tool, Claude Code, to automate a large-scale cyber espionage campaign targeting about 30 global organizations The hackers manipulated Claude Code to act as an "autonomous cyber attack agent," executing 80-90% of the tactical operations with minimal human involvement The campaign, codenamed GTG-1002, marks the first documented case of a foreign government leveraging AI to fully automate a cybe
Nov 14, 20252 min read
bottom of page
