top of page
ALL POSTS
Fake Moltbot AI Coding Assistant: Malware Threat in VS Code Marketplace
Key Findings A malicious Microsoft Visual Studio Code (VS Code) extension named "ClawdBot Agent - AI Coding Assistant" has been discovered on the official Extension Marketplace. The extension claims to be a free artificial intelligence (AI) coding assistant for the popular open-source project Moltbot, but it stealthily drops a malicious payload on compromised hosts. The extension was published by a user named "clawdbot" on January 27, 2026 and has since been taken down by Mic
Jan 292 min read
Vulnerabilities in PackageGate Allow Bypassing Protections in NPM, PNPM, VLT, and Bun
Key Findings Security firm Koi discovered a set of vulnerabilities collectively tracked as "PackageGate" affecting major JavaScript package managers like NPM, PNPM, VLT, and Bun. These flaws could let attackers bypass supply chain protections and run malicious code hidden inside compromised dependencies. The safeguards widely promoted after the Shai-Hulud attack, such as disabling lifecycle scripts and relying on lockfiles, do not fully hold against these new "PackageGate" vu
Jan 282 min read
Critical Sandbox Vulnerability in Popular vm2 Library Allows Arbitrary Code Execution
Key Findings A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library, tracked as CVE-2026-22709. The vulnerability carries a CVSS score of 9.8 out of 10.0, indicating its high severity. The flaw allows attackers to escape the sandbox environment and execute arbitrary code on the underlying operating system. Background vm2 is a Node.js library used to run untrusted code within a secure sandboxed environment. The library intercepts and prox
Jan 282 min read
Fortinet addresses actively exploited FortiOS SSO vulnerability (CVE-2026-24858)
Key Findings: Fortinet has released security updates to address a critical flaw (CVE-2026-24858, CVSS 9.4) impacting FortiOS, FortiManager, and FortiAnalyzer. The vulnerability is an authentication bypass related to the FortiCloud single sign-on (SSO) feature, which can allow an attacker with a FortiCloud account and a registered device to access other devices registered to different accounts. The vulnerability is actively being exploited in the wild, with Fortinet confirming
Jan 282 min read
Phantom Malware Hijacks Devices for Ad Fraud
Key Findings Android game mods bundled with "Android.Phantom" malware hijack devices for covert ad fraud Malware operates in two modes - "phantom" mode for automated ad interaction and remote control mode for real-time device control Uses machine learning techniques to mimic user behavior and avoid detection Spreads through unofficial app stores and third-party sources, not the official Google Play Store Affects popular game titles with high download counts, making it difficu
Jan 282 min read
Experts Detect Pakistan-Linked Cyber Campaigns Targeting Indian Government
Background Indian government entities have been targeted in two campaigns undertaken by a threat actor that operates in Pakistan using previously undocumented tradecraft. The campaigns have been codenamed Gopher Strike and Sheet Attack by Zscaler ThreatLabz, which identified them in September 2025. Key Findings The activity is assessed to potentially originate from a new subgroup or another Pakistan-linked group operating in parallel with the known APT36 group. The Gopher Str
Jan 272 min read
WhatsApp Rolls Out Stricter Account Settings to Enhance Protection for High-Risk Users
Key Findings Meta announced new Strict Account Settings on WhatsApp to enhance the security of high-risk users from advanced, targeted cyber attacks. Strict Account Settings is a lockdown-style security feature that applies the most restrictive privacy settings, limits how the app works, and blocks attachments or media from people not in your contacts. Meta is adopting the Rust programming language in WhatsApp's media sharing features to better protect photos, videos, and mes
Jan 272 min read
High-Severity DoS Flaw Hits React Server Components (CVE-2026-23864)
Key Findings: React team issued urgent security advisory about incomplete fixes for Denial of Service (DoS) vulnerabilities in React Server Components New high-severity flaw CVE-2026-23864 (CVSS 7.5) allows attackers to trigger server crashes, out-of-memory exceptions, or excessive CPU usage via "specially crafted HTTP requests" Vulnerability affects React packages using server-side rendering (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) in v
Jan 272 min read
Microsoft Releases Emergency Patch for Critical Office Vulnerability
Key Findings Microsoft issued emergency updates to fix an actively exploited Office zero-day, CVE-2026-21509, affecting Office 2016–2024 and Microsoft 365 Apps. The vulnerability is a security feature bypass that allows an unauthorized attacker to bypass security protections locally by sending a malicious Office file. Microsoft confirmed the Preview Pane is not an attack vector, but did not disclose technical details about the active exploits. Office 2021 and later are automa
Jan 272 min read
Lost No More: Apple Unveils AirTag 2 With 50% More Range and a Genius Apple Watch Upgrade
Key Findings Apple has unveiled the AirTag 2, the successor to its popular item tracking device. The new AirTag boasts a 50% increase in Precision Finding range and a 50% louder speaker. Precision Finding is now available on the Apple Watch, allowing users to locate lost items directly from their wrist. The AirTag 2 integrates a second-generation Ultra Wideband (UWB) chip, the same as in the latest iPhone and Apple Watch models. The device can securely share its location with
Jan 272 min read
Malicious VS Code AI Extensions Threaten Developer Security
Key Findings Two malicious Microsoft Visual Studio Code (VS Code) extensions, disguised as AI-powered coding assistants, have over 1.5 million combined installs and are stealing developer source code. The extensions, "ChatGPT - 中文版" and "ChatGPT - ChatMoss(CodeMoss)", capture every file being opened and every source code modification, and send the data to servers located in China without user knowledge or consent. The extensions also incorporate real-time monitoring and devic
Jan 262 min read
Targeted Indian Users in Tax Phishing Campaign Delivering Blackmoon Malware
Key Findings: Ongoing campaign targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage operation Phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive Malware known as Blackmoon (aka KRBanker) and a legitimate enterprise tool called SyncFuture TSM used as the final payload Sophisticated attack involving anti-analysis, privilege escalation, DLL sideloading, commercial-tool repurp
Jan 262 min read
Abandoned Python PLY Library Harbors Critical RCE Vulnerability (CVSS 9.8)
Key Findings A critical vulnerability (CVE-2025-56005) with a CVSS score of 9.8 has been discovered in the PLY (Python Lex-Yacc) library, a popular parsing library used in the Python community. The vulnerability allows Remote Code Execution (RCE) and stems from an undocumented "picklefile" parameter in the `yacc()` function. The issue is caused by the unsafe deserialization of untrusted data using Python's `pickle.load()` method. The project's maintainer, David Beazley, has a
Jan 262 min read
Konni Hackers Target Blockchain Developers with AI-Generated PowerShell Backdoor
Key Findings: The North Korean threat actor Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations. Konni, also tracked as Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia, has been
Jan 263 min read
Linux Kernel Patch: Addressing a 5-Year-Old x86 Memory Handling Vulnerability
Key Findings: A critical vulnerability has been discovered in the Linux kernel's x86 page fault handling mechanism, existing since 2020. The flaw was caused by inconsistent disabling of hardware interrupts, leading to potential catastrophic scenarios. The vulnerability was not limited to user-space address errors, but involved a more complex interplay between address ranges and execution context. The remediation required a fundamental shift in approach, moving away from selec
Jan 252 min read
Microsoft's BitLocker Encryption Keys Shared with the FBI
Key Findings The FBI obtained BitLocker encryption keys from Microsoft to access encrypted data on laptops seized during a fraud investigation in Guam. Microsoft provides these recovery keys to law enforcement when presented with a valid legal order, as the keys are often backed up to users' Microsoft accounts by default. This practice raises privacy concerns, as it allows authorities to bypass the encryption meant to protect users' data, even if the device owner has not know
Jan 252 min read
Osiris Ransomware Evolves, Leveraging BYOVD to Disarm Security Tools
Key Findings Symantec and VMware Carbon Black researchers have uncovered a new ransomware strain called Osiris, used in a November 2025 attack against a major Southeast Asian food service franchise operator. Osiris leverages the POORTRY driver in a bring-your-own-vulnerable-driver (BYOVD) attack to disable security software on targeted systems. The new ransomware has full-featured capabilities, including the ability to stop services and processes, select files and folders to
Jan 252 min read
New DynoWiper Malware Targets Polish Power Sector in Sandworm Attack
Key Findings The Russian nation-state hacking group known as Sandworm attempted a significant cyber attack targeting Poland's power sector in late December 2025. The attack involved the deployment of a previously undocumented wiper malware called DynoWiper. The attack was ultimately unsuccessful, with no evidence of successful disruption to Poland's energy infrastructure. This activity occurred on the 10th anniversary of Sandworm's 2015 attack against the Ukrainian power grid
Jan 242 min read
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities Key Findings: CISA added four security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities affect Synacor Zimbra Collaboration Suite, Versa Concerto SD-WAN orchestration platform, Vite Vitejs, and eslint-config-prettier npm package. CISA has ordered Federal Civilian Executive Branch (FCEB) agencies to apply th
Jan 232 min read
Fortinet Warns of Active FortiCloud SSO Bypass Impacting Patched Devices
Key Findings Fortinet confirmed attacks are bypassing FortiCloud SSO authentication, affecting even fully patched devices, similar to recent SSO flaws. Threat actors automate firewall changes, add users, enable VPNs, and steal configs, in campaigns resembling December 2025 exploits of critical FortiCloud SSO flaws. Arctic Wolf researchers reported a new automated attack cluster observed since January 15, 2026, targeting FortiGate devices. Attackers created generic accounts fo
Jan 231 min read
bottom of page

