OnlyFake and AI‑Generated Fake IDs: A Wake‑Up Call for KYC and AML Defenses

Dark urban scene with a hooded figure surrounded by money and IDs, representing chaos.

A 27‑year‑old Ukrainian citizen, Yurii Nazarenko — known online as John Wick, Tor Ford, and Uriel Septimberus — has pleaded guilty in the United States to operating OnlyFake, an AI‑powered platform that produced highly realistic fake identity documents. According to prosecutors, the service helped customers worldwide circumvent KYC (Know Your Customer) checks across banks, fintechs, … Read more

Anthropic–Pentagon Conflict: How AI Ethics Became a Cybersecurity and Supply Chain Flashpoint

A panoramic view of Washington, D.C. with the Pentagon, river, and monuments.

President Donald Trump has ordered all U.S. federal agencies to fully phase out Anthropic’s AI technologies within six months, following a sharp conflict between the company and the Department of Defense (DoD). The dispute centers on how Anthropic’s Claude models may be used in military and intelligence contexts, and it is rapidly turning into a … Read more

ClawJacked: Critical OpenClaw localhost WebSocket vulnerability exposes self-hosted AI assistants

Hacker monitors a screen displaying cybersecurity vulnerabilities and alerts.

Security researchers at Oasis Security have disclosed a critical vulnerability in the fast-growing self-hosted AI assistant OpenClaw. The flaw, dubbed ClawJacked, allowed a malicious website to silently connect to a user’s local OpenClaw instance, brute-force the administrator password, and seize full control. The issue is fixed in version 2026.2.26, released on 26 February, and users … Read more

Security Debt Is Exploding: What Veracode’s State of Software Security Report Reveals

d9343f69 c834 4fc0 895e 7044549fb8f4

Veracode’s latest State of Software Security report, based on analysis of more than 1.6 million applications, highlights a critical trend: software vulnerabilities are accumulating faster than organizations can remediate them. In an era of accelerated development and widespread use of AI tools, achieving robust application security is becoming increasingly difficult. Security Debt: When Known Vulnerabilities … Read more

Claude Code Vulnerabilities Expose New AI Developer Tool Supply Chain Risks

Hacker executing malicious code with exposed API keys and surveillance background.

Security researchers at Check Point have identified three serious vulnerabilities in Anthropic’s Claude Code AI developer assistant. These flaws allowed attackers to execute arbitrary code on a developer’s machine and silently steal API keys simply by getting the victim to open a malicious repository in Claude Code—no manual script execution required. AI assistant configuration as … Read more

Fulu Foundation Challenges Amazon Ring with Bounty for Local-Only Video Storage

Two figures in a dystopian setting, one hacking while the other surveys the skyline at sunset.

Non-profit Fulu Foundation has announced a monetary reward for security researchers and engineers who can make Amazon Ring cameras operate fully autonomously, streaming video to a local server instead of Amazon’s cloud. The initiative pushes Ring camera privacy and smart home security back into the spotlight, raising questions about data ownership, surveillance risks and the … Read more

Google Blocks UNC2814 Cyber Espionage That Used Google Sheets as C2

Two professionals monitor cybersecurity data in a futuristic office with a city view.

A large-scale cyber espionage operation attributed to the China-linked group UNC2814 has been disrupted by Google’s Threat Intelligence team, Mandiant, and partner organizations. The campaign stood out for its abuse of the Google Sheets API as a full-fledged command-and-control (C2) channel, allowing malicious traffic to blend seamlessly with legitimate cloud service requests. UNC2814 cyber espionage … Read more

PayPal Working Capital Data Breach: Software Bug Exposes Business Customers’ Personal Information

Hooded figure works on multiple screens surrounded by papers and a shattered tablet.

PayPal has notified a subset of its customers about a data breach in the PayPal Working Capital (PPWC) business lending application, caused not by a classic cyberattack but by a software defect. A faulty code change left sensitive information accessible to unauthorized parties for almost six months, highlighting how dangerous logical errors can be in … Read more

Massiv Android Banking Trojan Masquerades as IPTV App in Smishing Campaigns

Darkly themed digital art depicting cyber manipulation and threat.

A newly discovered Android banking trojan dubbed Massiv is being used in targeted attacks against mobile banking and government service users. Identified by ThreatFabric researchers, the malware impersonates popular IPTV applications and gives attackers near-complete control over compromised devices, enabling large-scale financial fraud and identity abuse. Smishing and fake IPTV apps: how Massiv infects Android … Read more

Critical Zyxel Router Vulnerability CVE-2025-13942 Puts Home and Office Networks at Risk

** Two cybersecurity analysts respond to a systems breach alert in a futuristic control room.

Zyxel has released urgent firmware updates to fix a critical remote command execution vulnerability in multiple product lines, including routers, fiber ONTs, and wireless repeaters. The flaw allows remote attackers to run arbitrary system commands without any authentication, creating a high‑impact risk for both home users and small businesses relying on these devices as their … Read more