LinkedIn Browser Fingerprinting: Extension Scanning, Privacy Risks, and Security Claims

Two hackers work on computers while a mysterious figure looms in the background.

LinkedIn, the professional networking platform owned by Microsoft, has become the focus of a growing privacy debate after the German association Fairlinked e.V. published a detailed report on its tracking practices. According to the research, LinkedIn is using hidden JavaScript to perform large-scale browser fingerprinting, checking for thousands of extensions and collecting granular technical data … Read more

Anthropic’s Project Glasswing: How Claude Mythos Changes Cybersecurity Risk

Person on a bench overlooking a tech campus with major company buildings.

Anthropic has unveiled Project Glasswing, an initiative that deploys its new frontier AI model Claude Mythos to hunt and remediate vulnerabilities in widely used, security‑critical software. The preview version of Claude Mythos is already being compared to the work of highly skilled human vulnerability researchers, raising both expectations and concerns across the cybersecurity community. Anthropic … Read more

North Korean “Contagious Interview” Campaign Targets Go, Rust and PHP in Software Supply Chain Attacks

Hacker coding with multiple programming language icons and an octopus on the laptop.

North Korean threat actors have significantly expanded the “Contagious Interview” software supply chain campaign, placing malicious packages across multiple open-source ecosystems, including Go, Rust and PHP. According to security company Socket, the objective is to compromise developer environments, gain initial access into corporate networks and enable both espionage and financially motivated operations. North Korean supply … Read more

ComfyUI Botnet Exploits Exposed Stable Diffusion Servers for Cryptomining and Proxy Abuse

Two men engaging in intense discussion at a computer workstation.

A large-scale botnet campaign is actively compromising publicly accessible ComfyUI instances – a popular web interface for the Stable Diffusion image generation framework. Attackers exploit misconfigured deployments and insecure custom nodes to achieve remote code execution, deploy cryptomining malware, and enroll compromised hosts into a botnet used both for mining and for selling proxy access. … Read more

Dark Applications and AI Agents: Closing the Identity Confidence Gap in Zero Trust Programs

Aerial view of San Francisco with digital network visuals illustrating tech issues.

By 2026, many enterprises report mature identity and access management (IAM) and Zero Trust security programs on paper, yet their real-world exposure to identity-related risk continues to increase. Recent research from Ponemon Institute indicates that the core problem is no longer a lack of IAM technology, but the scale of systems that remain outside centralized … Read more

Axios npm Compromise Exposes Coordinated Supply Chain Attacks on Node.js Maintainers

Visual depiction of tech company interactions with icons representing updates and tools.

The recent Axios npm compromise has turned out not to be an isolated incident but part of a coordinated software supply chain attack targeting key Node.js and npm maintainers. A detailed account from Axios maintainer Jason Saayman and analysis by security company Socket show a well-prepared social engineering campaign that uses fake corporate video calls … Read more

GPU RowHammer Attacks: GPUBreach, GDDRHammer and GeForge Threaten Cloud AI Security

Geese by the waterfront with Toronto skyline and solar panels in view.

Recent academic research has shown that modern high‑performance graphics processing units (GPUs) are vulnerable to a new class of RowHammer attacks on GDDR6 memory. These attacks can not only corrupt data stored in video memory, but in certain scenarios lead to full privilege escalation and complete takeover of the host system. The most notable techniques … Read more

Hasbro Cyber Attack: Analysis of the 2025 Security Incident and Supply Chain Risks

Aerial view of Hasbro building with maintenance sign and city skyline nearby.

Global toy and entertainment giant Hasbro has reported a significant cybersecurity incident that could disrupt parts of its operations for weeks. The company disclosed that a cyber attack was detected on March 28, 2025 and has already notified investors and stakeholders that full restoration of affected IT systems may take considerable time. Hasbro cyber attack: … Read more

Storm-1175 Uses Zero-Day Vulnerabilities to Deliver Medusa Ransomware in Rapid Attacks

Cyber attack scene featuring iconic landmarks with a dramatic backdrop.

A China-based cybercriminal group tracked by Microsoft Threat Intelligence as Storm-1175 is conducting highly automated, high-speed attacks against internet-facing systems to deploy Medusa ransomware. The actors combine previously unknown zero-day vulnerabilities with recently disclosed but unpatched N-day vulnerabilities, significantly reducing the time defenders have to detect and respond. Storm-1175 targets and global ransomware campaign footprint … Read more

Flowise Vulnerability CVE-2025-59528: Critical RCE Threat to AI Infrastructure

USB drive with an API key tag connected to a computer, glowing light.

The open‑source AI orchestration platform Flowise has been hit by a critical security vulnerability, tracked as CVE-2025-59528 with the maximum CVSS score of 10.0. According to researchers at VulnCheck, the flaw is already being actively exploited, allowing attackers to execute arbitrary code on Flowise servers and potentially compromise connected corporate AI workflows and data stores. … Read more