Technology

Docker fixes critical Ask Gordon AI flaw that allows code execution via image metadata

Cybersecurity researchers have detailed a patched security flaw affecting Ask Gordon, the…

5 Min Read

Learn what to build, buy, and automate

Most security teams today are buried in tools. Too many dashboards. Too…

2 Min Read

APT28 uses Microsoft Office CVE-2026-21509 in espionage-focused malware attack

Russia-linked state-sponsored threat actor known as APT28 (also known as UAC-0001) is…

5 Min Read

OpenClaw bug allows one-click remote code execution via malicious link

A high-severity security flaw has been disclosed in OpenClaw (previously known as…

5 Min Read

Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users

A security audit of ClawHub's 2,857 skills uncovered 341 malicious skills across…

6 Min Read

Proxy botnets, Office zero-days, MongoDB ransoms, AI hijacking and new threats

Every week brings new discoveries, attacks, and defenses that shape the state…

37 Min Read

Notepad++ official update mechanism is hijacked and malware is distributed to specific users

Administrators of Notepad++ have revealed that state-sponsored attackers have hijacked the utility's…

2 Min Read

From triage to threat hunting: how AI accelerates SecOps

If you work in security operations, you'll be familiar with the concept…

8 Min Read

Two high-severity flaws in n8n allow authenticated remote code execution

Cybersecurity researchers have uncovered two new security flaws in the n8n workflow…

3 Min Read