On Anthropic’s Mythos Preview and Project Glasswing
On Anthropic’s Mythos Preview and Project Glasswing The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and...
On Anthropic’s Mythos Preview and Project Glasswing The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and...
Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa Pierluigi Paganini April 07, 2026 China-based actor Storm-1175 runs...
It’s called AirSnitch: Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure...
Phishing campaign exploits OAuth redirection to bypass defenses Pierluigi Paganini March 03, 2026 Microsoft researchers warn that threat actors abuse...
Former U.S. Defense contractor executive sentenced for selling zero-day exploits to Russian broker Operation Zero Pierluigi Paganini February 25, 2026...
Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration Pierluigi Paganini February 24, 2026 Russia-linked APT28 targeted European entities with...
SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning Pierluigi Paganini February 11, 2026 A new Linux botnet,...
APT28 exploits Microsoft Office flaw in Operation Neusploit Pierluigi Paganini February 03, 2026 Russia-linked APT28 is behind Operation Neusploit, exploiting...