Home

Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer

Threat actors are evolving — and they’re doing it on trusted platforms. A recent campaign shows attackers abusing shareable ChatGPT and Grok conversations, then promoting those links through Google Search [...]

Microsoft 365 Admin Center Disruption Affects North American Users

Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating operational challenges for organizations that depend on the platform for daily management [...]

Malicious 7-Zip Files Converting PCs into Proxy Nodes

Cybercriminals are running a sneaky operation that uses a fake version of the popular 7-Zip archiving tool to compromise everyday home computers. Instead of just installing file compression software, victims [...]

FortiOS Authentication Flaw Enables LDAP Bypass

A new security advisory from Fortinet highlights a serious weakness in FortiOS that could let attackers slip past authentication controls in certain environments. The issue, tracked as CVE-2026-22153, affects how [...]

By | February 10th, 2026|Cybersecurity, Secuirty Update, Security Advisory, vulnerability|0 Comments

Claude Desktop Security Bug Opens Door to RCE

Security researchers at LayerX uncovered a design-level weakness affecting Claude Desktop Extensions (DXT), the extension framework tied to Anthropic’s assistant. The flaw enables a zero-click remote code execution (RCE) scenario, [...]

By | February 10th, 2026|Cybersecurity, Application Security, Secuirty Update, Security Advisory|0 Comments

Subscribe to our newsletter to receive security tips everday!