
WormGPT: The Blueprint for Malicious AI
WormGPT: The Blueprint for Malicious AI The story of WormGPT is about what happens when a proof-of-concept becomes a brand and is one of the first examples of how AI is used in cyberattacks. ...

OSINT Tools for Cybersecurity: A Practical Guide for Security Teams
OSINT Tools for Cybersecurity: A Practical Guide for Security Teams Attackers are already running open source intelligence operations against your organization. They are mapping your exposed infrastru...

Bitwarden CLI Hijacked in npm Supply Chain Attack Linked to TeamPCP & ...
Bitwarden CLI Hijacked in npm Supply Chain Attack Linked to TeamPCP & Checkmarx Breach A malicious version of the Bitwarden CLI circulated on npm for roughly 90 minutes on April 22, 2026, silently...

How OSINT is Used in Cybersecurity (Real-World Use Cases)
How OSINT is Used in Cybersecurity (Real-World Use Cases) In 2018, investigators at Bellingcat unmasked 305 officers from Russia’s military intelligence unit, GRU Unit 26165, using nothing but a publi...

How AI Changed Vishing: Case of PlugValley
How AI Changed Vishing: Case of PlugValley Vishing or voice phishing is not a new attack. Fraudsters have been calling people and pretending to be banks, government agencies, and tech support for deca...

CVE-2026-38526 in Krayin CRM Enables RCE
CVE-2026-38526 in Krayin CRM Enables RCE CVE-2026-38526 is a critical authenticated remote code execution (RCE) vulnerability affecting Webkul Krayin CRM / Krayin Laravel CRM v2.2.x. The issue is in t...

Maritime OSINT: Tracking Dark Ships & Shadow Fleets
Maritime OSINT: Tracking Dark Ships & Shadow Fleets Every day, thousands of oil tankers move through the world’s oceans. Most of them broadcast their position, their name, and their destination to...

Vercel Breach: Hacker Claims to Sell Stolen Data in Potential Global S...
Vercel Breach: Hacker Claims to Sell Stolen Data in Potential Global Supply Chain Attack On April 19, 2026, Vercel, the cloud development platform behind Next.js and Turbopack, disclosed a security in...

Vercel and Binance Data Claims, Israel Facebook Leak, FALKONc2 Sale, a...
Vercel and Binance Data Claims, Israel Facebook Leak, FALKONc2 Sale, and Gmail Caller Recruitment SOCRadar Dark Web Team identified several new underground posts, including an alleged Vercel access ke...

Public Elasticsearch Servers Expose 9.8 Billion Credential Records Acr...
Public Elasticsearch Servers Expose 9.8 Billion Credential Records Across Enterprise, Cloud, and AI Platforms Misconfigured Elasticsearch servers continue to expose massive volumes of sensitive data. ...

Nmap Commands Guide: Cheat Sheet & Reference
Nmap Commands Guide: Cheat Sheet & Reference Nmap (Network Mapper) is a free, OSINT tool used to discover devices and services on a network. Security professionals, system administrators, and ethi...

Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next
Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next Since the Iran War began on February 28, 2026, the conflict has moved through phases that most threat frameworks were not built to tr...

BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exp...
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exploited in the Wild Three Windows Defender vulnerabilities disclosed as zero-days in April 2026 are now being actively exploited: B...

Void Stealer: The Infostealer Malware Quietly Targeting Organizations ...
Void Stealer: The Infostealer Malware Quietly Targeting Organizations in 2026 Void Stealer is an infostealer malware that emerged in late 2025 and has been running active campaigns against users and o...

April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including...
April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including One Actively Exploited Microsoft released its April 2026 Patch Tuesday security updates, resolving a total of 165 vulnerabilities...

AI Across the Attack Chain From Recon to Execution
AI Across the Attack Chain From Recon to Execution Artificial intelligence has moved from a supporting tool to an active component in cyber operations. Earlier use cases were limited to analysis and c...

Top 10 Free Threat Intelligence Tools for MSSPs
Top 10 Free Threat Intelligence Tools for MSSPs Threat intelligence helps Managed Security Service Providers (MSSPs) move faster, prioritize better, and give clients clearer answers when new risks app...
Deep Web vs Dark Web: What’s the Real Difference?
Deep Web vs Dark Web: What’s the Difference? The deep web includes private parts of the internet that are not indexed by search engines and usually require standard browser access with credentials. Th...

CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticate...
CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticated RCE Path Apache Tomcat users running Tribes clustering should pay attention to CVE-2026-34486, an important-severity regression ...

Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Gov...
Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Government Breach A cyberattack spanning nine Mexican government organizations has become one of the clearest examples yet of how...
