North Korean Hackers Weaponize Google Gemini in Advanced AI-Driven Cyber Operations

Military officer monitors urban skyline with North Korean flag and iconic tower.

Generative AI is rapidly shifting from a productivity tool to a powerful asset in the hands of cybercriminals. According to a report from the Google Threat Intelligence Group (GTIG), the North Korean-linked threat actor UNC2970—overlapping with the well-known Lazarus Group, Diamond Sleet and Hidden Cobra clusters—has begun actively abusing the Google Gemini model to support … Read more

Advanced Supply Chain Attacks on npm and PyPI: Lazarus‑Linked graphalgo Campaign and New Malware Waves

** Hacker working at a computer amid cryptocurrency symbols and messages.

Open source ecosystems npm and PyPI have again become high‑value targets in a coordinated software supply chain attack. Cybersecurity researchers have linked a new campaign, dubbed graphalgo, to the North Korea‑aligned Lazarus APT group. By combining fake blockchain job offers, realistic coding tests and staged malicious package updates, the attackers aim to compromise developers, exfiltrate … Read more

Continuous Threat Exposure Management (CTEM): The New Divide in Enterprise Cybersecurity

Visual representation of the growing security divide in cybersecurity statistics.

A recent 2026 market study of 128 senior security decision‑makers reveals a clear split between enterprises that have adopted Continuous Threat Exposure Management (CTEM) and those that still rely on traditional, fragmented security practices. The divide is not primarily about budget or industry. It is driven by whether an organization has implemented a continuous, risk‑based … Read more

AI-Generated Passwords Are Not Secure: New Research Exposes LLM Password Weaknesses

High-tech cityscape with hackers viewing screens as a skull image illuminates the building.

Large language models such as ChatGPT, Claude and Gemini are increasingly being used not only for text generation, but also for creating passwords and API secrets. At first glance, these AI-generated passwords look strong: they are long, contain upper- and lowercase letters, digits and special characters. However, new research by the company Irregular demonstrates that … Read more

Google Chrome Zero-Day CVE-2026-2441: What You Need to Know About the Latest Critical Browser Vulnerability

Aerial view of Google campus with a warning symbol and smoke rising from a central area.

Google has released an out-of-band Chrome security update to fix CVE-2026-2441, the first publicly known Chrome zero-day vulnerability of 2026. The company has confirmed that the flaw is already being exploited in real-world attacks with a working exploit, which elevates the issue to a high‑priority risk for both individual users and organizations. Chrome zero-day CVE-2026-2441: … Read more

Microsoft 365 Copilot Bug Bypasses DLP and Sensitivity Labels for Confidential Emails

Split scene showing a productive figure with office apps and a sinister hacker with confidential documents.

A recently identified bug in the corporate version of Microsoft 365 Copilot allowed the AI assistant to read and summarize confidential emails, even when Data Loss Prevention (DLP) policies and sensitivity labels should have blocked such access. The incident highlights a growing class of risks where AI services embedded in office platforms interact incorrectly with … Read more

Mamont Android Banking Trojan Uses Fake Telegram Accelerator to Target Users

Aerial view of a city with visual links to digital communication and technology.

A new malicious campaign involving the Mamont Android banking trojan is actively targeting users, exploiting fake “Telegram accelerator” apps to compromise devices and steal money. According researchers, this wave of attacks began in mid-February and has already affected thousands of users who installed the infected APK outside of Google Play. How attackers spread the Mamont … Read more

Mamont Android Banking Trojan Uses Fake Telegram Accelerator to Target Users

Aerial view of a city with visual links to digital communication and technology.

A new malicious campaign involving the Mamont Android banking trojan is actively targeting users, exploiting fake “Telegram accelerator” apps to compromise devices and steal money. According researchers, this wave of attacks began in mid-February and has already affected thousands of users who installed the infected APK outside of Google Play. How attackers spread the Mamont … Read more

Odido Data Breach 2026: 6.2 Million Dutch Telecom Customers Exposed in Major Cyber Attack

Cybersecurity team responding to a dramatic data breach amid chaos and flames.

One of the Netherlands’ largest telecom providers, Odido—formed in 2023 on the basis of T-Mobile Netherlands and Tele2 Netherlands—has disclosed a major data breach affecting approximately 6.2 million customers. The incident, detected on 7 February 2026, is already being viewed as one of the most significant data leaks in the European telecom sector in recent … Read more

PromptSpy: AI-Powered Android Malware Uses Google Gemini for Stealth and Persistence

Futuristic scene with characters engaged in technology and an AI figure in the background.

ESET researchers have documented PromptSpy, a new Android malware family that stands out as the first publicly known mobile threat to directly invoke a generative AI model during runtime. By integrating the cloud-based Google Gemini API, the malware adapts to different Android user interfaces, strengthens its persistence, and significantly complicates detection and removal. From VNCSpy … Read more