Red Menshen’s BPFdoor: Stealth Cyber Espionage Against Global Telecom Operators

Two operatives react intensely while analyzing data on a laptop in a control room.

Major telecommunications providers around the world are facing a long-running and highly covert cyber‑espionage campaign attributed to the China‑linked threat cluster Red Menshen (also tracked as Earth Bluecrow, DecisiveArchitect, Red Dev 18). According to a recent Rapid7 investigation, the attackers quietly embed themselves for years in telecom network infrastructure to gain persistent access to government … Read more

AI Agents in SaaS: Why the Cyber Kill Chain Fails and What OpenClaw Exposed

Futuristic cybernetic head amid digital elements and a chessboard.

In September 2025, Anthropic publicly disclosed a cyber‑espionage campaign in which a state‑sponsored threat actor used an AI agent to autonomously conduct operations against 30 global targets. According to Anthropic’s assessment, the system performed 80–90% of the tactical workload on its own: reconnaissance, exploit development, and lateral movement across networks at machine speed. This incident … Read more

Google Ads Malvertising Campaign Uses Huawei Driver in BYOVD Attack to Kill EDR

Dark digital art depicting a hacker's chaotic scene with skull and computer elements.

A large-scale malvertising campaign active since January 2026 is abusing Google Ads to target US users searching for tax forms such as “W2 tax form” and “W‑9 Tax Forms 2026”. Instead of legitimate IRS or vendor sites, victims are redirected to look‑alike pages that distribute a trojanized ConnectWise ScreenConnect installer. Through this foothold, attackers deploy … Read more

Malicious npm Packages theGhost: New Node.js Supply Chain Attacks Target Crypto Wallets and Developer Credentials

Malicious npm Packages theGhost Node.js Supply Chain Attacks Target Crypto Wallets

A new wave of malicious npm packages is targeting the Node.js ecosystem, focusing on the theft of cryptocurrency wallets and sensitive developer data. Security company ReversingLabs is tracking the activity under the name theGhost, linking it to the broader GhostClaw campaign previously documented by JFrog and Jamf Threat Labs. The attacks highlight once again how … Read more

Google Gemini Launches AI-Powered Dark Web Threat Intelligence and SOC Agents

Note offering bank network access held above a USB drive on a cluttered keyboard.

Google is expanding its Threat Intelligence ecosystem with a new Gemini-based dark web monitoring service designed to automatically scan underground forums and highlight threats that matter to a specific organization. The tool is already available in public preview and signals a shift from generic dark web monitoring to context-aware, organization-centric threat intelligence. AI-Powered Dark Web … Read more

Tycoon2FA Phishing Platform Rapidly Recovers After Europol Takedown and Resumes MFA‑Bypassing Attacks

Hooded figure at a computer with a fiery globe and dark atmosphere.

The phishing-as-a-service platform Tycoon2FA, which Europol publicly claimed to have disrupted in early March, has almost fully restored its operations. Despite the seizure of hundreds of domains and the involvement of major technology vendors, the operators behind Tycoon2FA were able to rebuild their infrastructure within days and return to pre‑takedown phishing volumes. Europol’s Operation Against … Read more

FCC Moves Against Foreign-Made Wi‑Fi Routers: Cybersecurity and Supply Chain Implications

Close-up of electronic device showcasing a connection port and branding label.

According to recent reports, the US Federal Communications Commission (FCC) has updated its Covered List of communications equipment deemed a national security risk, now explicitly targeting consumer Wi‑Fi routers designed or manufactured outside the United States. This shift reframes home and small-office networking hardware as a strategic security asset, with far‑reaching consequences for cybersecurity, supply … Read more

PolyShell Vulnerability in Magento and Adobe Commerce: Unauthenticated File Upload, RCE and Defacement Risks

** Dark digital landscape featuring hackers, data theft, and ominous imagery.

A newly disclosed critical vulnerability dubbed PolyShell exposes all current versions of Magento Open Source and Adobe Commerce 2.x to unauthenticated file upload. According to research by Sansec, this flaw enables attackers to place arbitrary files on vulnerable servers, opening a direct path to remote code execution (RCE), stored cross‑site scripting (stored XSS) and ultimately … Read more