An Identity Theft Protection Company Was Just Hacked by a Phone Scammer

Aura sells identity protection. A scammer called one employee, said the right things, and walked out with data on 900,000 people. The irony is real, but the lesson is bigger.

Read More

The Toolchain Turned Hostile: Trivy and Langflow Show Security Pipeline Fragility

A compromised Trivy vulnerability scanner and an AI pipeline builder exploited within 20 hours of disclosure reveal a deepening problem: the tools developers trust for security are becoming high-value attack targets.

Read More

Patch Weekend Is Here: Why Oracle IAM and Cisco FMC Can't Wait

Oracle pushed an emergency out-of-band patch for a critical identity manager RCE. CISA set a Sunday deadline on a max-severity Cisco firewall management flaw. Both hit identity and perimeter management simultaneously.

Read More

iPhone Exploit Kits Go Mainstream: DarkSword, Coruna, and the End of 'iOS Is Enough'

New research from Google, iVerify, and Lookout confirms iOS exploit kits have moved from rare targeted spyware to website-level deployment against broad populations. A companion toolkit was found targeting US government officials specifically.

Read More

The Insider Front Door: How Legitimate Access Keeps Becoming Extortion

A data analyst extorted his employer for $2.5M using access his job gave him. Three Americans helped North Korean operatives infiltrate US companies as fake IT workers. Different crimes, same root problem.

Read More

Handala, Publicly Attributed: What the FBI Seizure Changes About Iran Cyber Signaling

The FBI seized Handala's sites and released a 40-page warrant formally linking the group to Iran's intelligence ministry. Attribution just moved from analyst opinion to federal court filing.

Read More