Fake Claude AI Malware Campaign Delivers New “Beagle” Backdoor to Windows Systems
Cybercriminals are exploiting the AI boom with a fake Claude AI website delivering the new “Beagle” Windows backdoor through sophisticated…
Cybercriminals are exploiting the AI boom with a fake Claude AI website delivering the new “Beagle” Windows backdoor through sophisticated…
On 3 May 2026, Microsoft Defender generated high-severity detections for trusted DigiCert root certificates, reportedly identifying them as Trojan:Win32/Cerdigent.A!dha. The…
The emergence of AI systems capable of discovering, validating, and even exploiting software vulnerabilities marks a turning point in cybersecurity.…
On 14 April 2026, Lugano became the meeting point for some of the most influential voices in cybersecurity and artificial…
U.S. authorities have warned that Iranian-affiliated cyber actors are escalating attacks against American critical infrastructure, with a growing focus on…
The European Commission has confirmed a data breach after a cyberattack on the cloud infrastructure hosting Europa.eu. Early findings suggest…
Censys has disclosed a previously undocumented Russian-origin .NET toolkit called CTRL that is delivered through fake private-key LNK files and…
The two Chrome zero-day vulnerabilities highlight how browsers remain a prime attack surface. Memory corruption in Skia and flaws in…
The EU’s PSD2 directive transformed digital payments with stronger security, open banking and clear liability rules. But does it force…
Google patched an actively exploited Chrome zero-day (CVE-2026-2441) enabling remote code execution via a CSS use-after-free flaw. CISOs must act…