Docker fixes critical Ask Gordon AI flaw that allows code execution via image metadata
Cybersecurity researchers have detailed a patched security flaw affecting Ask Gordon, the…
5 Min Read
Learn what to build, buy, and automate
Most security teams today are buried in tools. Too many dashboards. Too…
2 Min Read
APT28 uses Microsoft Office CVE-2026-21509 in espionage-focused malware attack
Russia-linked state-sponsored threat actor known as APT28 (also known as UAC-0001) is…
5 Min Read
OpenClaw bug allows one-click remote code execution via malicious link
A high-severity security flaw has been disclosed in OpenClaw (previously known as…
5 Min Read
Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users
A security audit of ClawHub's 2,857 skills uncovered 341 malicious skills across…
6 Min Read
Proxy botnets, Office zero-days, MongoDB ransoms, AI hijacking and new threats
Every week brings new discoveries, attacks, and defenses that shape the state…
37 Min Read
Notepad++ official update mechanism is hijacked and malware is distributed to specific users
Administrators of Notepad++ have revealed that state-sponsored attackers have hijacked the utility's…
2 Min Read
From triage to threat hunting: how AI accelerates SecOps
If you work in security operations, you'll be familiar with the concept…
8 Min Read
Two high-severity flaws in n8n allow authenticated remote code execution
Cybersecurity researchers have uncovered two new security flaws in the n8n workflow…
3 Min Read