❌

Normal view

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

17 March 2026 at 16:39
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. In a report published Monday, BeyondTrust revealed that Amazon Bedrock AgentCore Code Interpreter's sandbox mode permits outbound DNS queries that an attacker can exploit to enable interactive shells

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

17 March 2026 at 14:34
The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites as an initial access method. The use of ClickFix, where users are tricked into manually running malicious commands to address non-existent errors, is a departure from relying on traditional methods for obtaining initial access, such as through stolen credentials

AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds

17 March 2026 at 11:30
A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and Adversarial Testing Benchmark Report 2026 from Pentera. The report, based on a survey of 300 US CISOs and senior security leaders, examines how organizations are securing AI infrastructure and highlights critical gaps tied to skills shortages and

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

17 March 2026 at 09:53
North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to distribute malicious payloads to certain contacts. The activity has been attributed by South Korean threat intelligence firm Genians to a hacking group referred to as Konni. "Initial access was achieved through a spear-phishing email disguised as a

Too big to ignore, too small to be served: the midmarket security gap

17 March 2026 at 09:00

Midmarket security leaders aren't as secure as they think, says Intruder's report

Partner Content The midmarket matters. JP Morgan estimatesΒ approximately 300,000 organizations generating $13T in annual revenue. Yet they occupy an awkward position in the security landscape. They're large enough to be attractive targets with complex digital estates, significant revenue, and valuable data, but not large enough to have the headcount, budget maturity, or tooling sophistication of an enterprise security team.…

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

17 March 2026 at 05:23
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions

Gartner suggests Friday afternoon Copilot ban because tired users may be too lazy to check its mistakes

17 March 2026 at 04:37

Admins may be even more exhausted by then, because securing Microsoft’s AI helper is not a trivial job

Gartner analyst Dennis Xu has half-jokingly suggested banning use of Microsoft’s Copilot AI on Friday afternoons, because he fears at that time of week users may be too lazy to properly check its possibly offensive output.…

Weekly Update 495

17 March 2026 at 02:55
Weekly Update 495

In the beginning, it was simple. A website, a database and 150M+ email addresses to search. Time has added serverless functions (which run on servers πŸ€·β€β™‚οΈ), code on the edge, new data storage constructs and a completely different mechanism for even just querying a simple email address. HIBP is a continually evolving beast, and barely a week goes by that we don't implement code of significance. You don't always see it out there in the public realm, but the tweaks - in including the major one I talk about in this week's video - all add up to make the platform faster, more sustainable and if we do it right, even a bit more cost-effective to run 😊

Weekly Update 495
Weekly Update 495
Weekly Update 495
Weekly Update 495

Bank built its own threat hunting agent because vendors can’t keep pace with new threats

17 March 2026 at 02:37

AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes

Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered threats, according to General Manager of Cyber Defence Operations Andrew Pade.…

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

16 March 2026 at 19:37
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. "The attack targets Python projects β€” including Django apps, ML research code, Streamlit dashboards, and PyPI packages β€” by appending obfuscated code to files like setup.py, main.py, and app.py," StepSecurity said. "Anyone who runs

❌