Shadow Campaigns: Global Espionage Exploiting SAP and Exchange Flaws
Palo Alto Networks Unit 42 uncovered a coordinated espionage operation dubbed “Shadow Campaigns” that chains together multiple high‑severity vulnerabilities
Grok AI Still Spits Out Sexual Content, Moderation Fails Again
Malwarebytes has confirmed that the Grok AI image‑generation model continues to produce sexualized images despite earlier assurances that the
VMware Unveils vDefend Lateral Security to Harden Zero Trust Environments
VMware’s latest blog details the rollout of vDefend Lateral Security, an extension to its Zero Trust framework that embeds
Inside the Mind of Phishers: Why Even Experts Bite
Palo Alto Networks’ Unit42 dissected recent phishing campaigns to uncover the cognitive levers that lure even security‑savvy users. Their
Cloudflare Launches Serverless Post‑Quantum Matrix Homeserver for Defenders
Cloudflare has published a step‑by‑step guide to deploy a Matrix homeserver entirely on its Workers platform, using post‑
Critical SolarWinds Web Help Desk Flaw Actively Exploited, Remote Code Execution Possible
A remote code execution vulnerability (CVE‑2024‑XXXX) has been discovered in SolarWinds Web Help Desk and is now being
Amaranth‑Dragon Weaponizes CVE‑2025‑8088 in Southeast Asian Espionage Surge
Check Point researchers have traced a new wave of activity to the Amaranth‑Dragon threat group, a known offshoot of
CrowdStrike Tops Gartner Peer Insights as Preferred ASPM Tool for Defenders
CrowdStrike was named a Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer report for Application Security
Amaranth‑Dragon Exploits WinRAR CVE‑2025‑8088 for Southeast Asian Espionage
A China‑linked threat group identified as Amaranth‑Dragon is leveraging the recent WinRAR vulnerability (CVE‑2025‑8088) to distribute
Inside the Mind Games Powering Modern Phishing Attacks
Unit42’s latest investigation dissects how threat actors weaponize basic human instincts—authority, urgency, and social proof—to drive phishing