Skip to content
Security News, Assessments & Alerts

Security News, Assessments & Alerts

Security Issues, Vulnerabilities, Exploits & Government Alerts

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. “Our vulnerability lives in… 

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle… 

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Ravie LakshmananFeb 28, 2026National Security / Artificial Intelligence Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply chain risk.”… 

DoJ Seizes  Million in Tether Linked to Pig Butchering Crypto Scams

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

Ravie LakshmananFeb 27, 2026Financial Crime / Social Engineering The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as… 

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Ravie LakshmananFeb 27, 2026Network Security / Vulnerability The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting… 

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Ravie LakshmananFeb 27, 2026Malware / Linux Security Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The… 

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to… 

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Ravie LakshmananFeb 27, 2026Endpoint Security / Windows Security Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A… 

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Ravie LakshmananFeb 27, 2026Online Scam / Digital Advertising Meta on Thursday said it’s taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China,… 

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying on traditional servers or domains…