Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer
Threat actors are evolving — and they’re doing it on trusted platforms. A recent campaign shows attackers abusing shareable ChatGPT and Grok conversations, then promoting those links through Google Search [...]
Microsoft 365 Admin Center Disruption Affects North American Users
Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating operational challenges for organizations that depend on the platform for daily management [...]
Malicious 7-Zip Files Converting PCs into Proxy Nodes
Cybercriminals are running a sneaky operation that uses a fake version of the popular 7-Zip archiving tool to compromise everyday home computers. Instead of just installing file compression software, victims [...]
FortiOS Authentication Flaw Enables LDAP Bypass
A new security advisory from Fortinet highlights a serious weakness in FortiOS that could let attackers slip past authentication controls in certain environments. The issue, tracked as CVE-2026-22153, affects how [...]
Claude Desktop Security Bug Opens Door to RCE
Security researchers at LayerX uncovered a design-level weakness affecting Claude Desktop Extensions (DXT), the extension framework tied to Anthropic’s assistant. The flaw enables a zero-click remote code execution (RCE) scenario, [...]