APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
27
Aug
2025

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files

Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one…

Coles eyes AI to keep shelves stocked in next viral recipe trend
27
Aug
2025

Coles eyes AI to keep shelves stocked in next viral recipe trend

Coles Group is hoping AI can play a role in better preparing the retailer and its value chain for the…

27
Aug
2025

Who’s Not Getting Laid Off?

Who’s not being laid off? That’s my question. I’m thinking about all these layoffs and trying to figure out if…

ConnectWise warns of threat activity linked to suspected nation-state hackers
27
Aug
2025

Hackers steal data from Salesforce instances in widespread campaign

Hackers stole user credentials from Salesforce customers in a widespread campaign earlier this month, according to researchers at Google Threat…

Researchers flag code that uses AI systems to carry out ransomware attacks
27
Aug
2025

Researchers flag code that uses AI systems to carry out ransomware attacks

Researchers at cybersecurity firm ESET claim to have identified the first piece of AI-powered ransomware in the wild. The malware,…

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
27
Aug
2025

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks

Cybersecurity landscapes are undergoing a paradigm shift as threat actors increasingly deploy agentic AI systems to orchestrate sophisticated social engineering…

Circles.Life fined over identity checking failures during mobile porting
26
Aug
2025

Exetel fined $694k over system ‘vulnerability’ in mobile number porting

Exetel has been penalised $694,000 after scammers were able to port mobile numbers to the telco and use them to…

26
Aug
2025

The Third Limitation to Creativity

I just wrote a new piece about the two primary limitations to creativity. You should check it out. But after…

Matt Kapko
26
Aug
2025

Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent

Google Threat Intelligence Group warned about a “widespread data theft campaign” that compromised hundreds of Salesforce customers over a 10-day…

Google to Add New Layer of Developer Verification to Distribute Apps on Play Store
26
Aug
2025

Google to Add New Layer of Developer Verification to Distribute Apps on Play Store

Android’s open ecosystem has been both its greatest strength and a persistent security challenge. While sideloading offers developers and users…

CitrixBleed 2:a nightmare that echoes CitrixBleed flaw in NetScaler
26
Aug
2025

Citrix fixed three NetScaler flaws, one of them actively exploited in the wild

Citrix fixed three NetScaler flaws, one of them actively exploited in the wild Pierluigi Paganini August 26, 2025 Citrix addressed…

26
Aug
2025

MCPs are just other people’s prompts and other people’s APIs

I’ve been thinking about Model Context Protocols (MCPs) for months, and here’s the simplest way to explain what they actually…