Blind Eagle's Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
27
Aug
2025

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…

27
Aug
2025

One-click MCP servers with Cloudflare

Cloudflare simplifying MCP deployment (click for full size) One thing I’ve never liked about the whole MCP thing is the…

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell
27
Aug
2025

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell

In recent weeks, a sophisticated phishing operation known as the ZipLine campaign has targeted U.S.-based manufacturing firms, leveraging supply-chain criticality…

CISA Issues New ICS Advisories on Critical Vulnerabilities and Exploits
27
Aug
2025

CISA Issues New ICS Advisories on Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released three Industrial Control Systems (ICS) advisories on August 26, 2025, detailing nine…

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
27
Aug
2025

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

Aug 27, 2025Ravie LakshmananCloud Security / Threat Intelligence A widespread data theft campaign has allowed hackers to breach sales automation…

ESET warns of PromptLock, the first AI-driven ransomware
27
Aug
2025

ESET warns of PromptLock, the first AI-driven ransomware

ESET warns of PromptLock, the first AI-driven ransomware Pierluigi Paganini August 27, 2025 ESET found PromptLock, the first AI-driven ransomware,…

27
Aug
2025

Most AI Interaction Will Go Through Your DA

The stages of technological evolution (click for full size) A long time ago, I wrote about how things tend to…

What to expect after going public with a bug bounty program?
27
Aug
2025

What to expect after going public with a bug bounty program?

You asked, and we answered. At Intigriti, we’ve been paying close attention to the questions most frequently asked by those…

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment
27
Aug
2025

DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment

A whistleblower disclosure filed today alleges that the Department of Government Efficiency (DOGE) within the Social Security Administration (SSA) covertly…

Massive WordPress Site Compromise Used to Execute Malicious Commands on Victims
27
Aug
2025

Massive WordPress Site Compromise Used to Execute Malicious Commands on Victims

A large-scale cybercrime conspiracy known as ShadowCaptcha was made public by cybersecurity researchers at Israel’s National Digital Agency. This campaign…

27
Aug
2025

Is Opencode as Smart as Claude Code?

The battle of the AI coding assistants (click for full size) I want to answer the question of how good…

The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
27
Aug
2025

“The entire internet is broken”: ethical hacking expert John Hammond meets James Kettle | Blog

Amelia Coen | 27 August 2025 at 09:11 UTC In a brand-new collaboration between ethical hacking and AppSec expert John…