1. The US Congressional Budget Office confirmed unauthorized ac…
The US Congressional Budget Office confirmed unauthorized access to its networks in a suspected foreign cyberattack potentially exposing emails with congressional offices.
Category: Newsletter
2. A significant data leak from Chinese cybersecurity firm Know…
A significant data leak from Chinese cybersecurity firm Knownsec exposed cyber weapon specifications, proprietary hacking tool source code, government collaboration details, and a list of 80 compromised overseas surveillance targets.
Category: Newsletter
3. A detailed demonstration shows how an ARM-based IoT device’s…
A detailed demonstration shows how an ARM-based IoT device’s Address Space Layout Randomization (ASLR) can be bypassed using Return-Oriented Programming (ROP), enabling unauthenticated remote code execution via memory manipulation.
Category: Newsletter
4. The article advocates for redesigning systems in which AI en…
The article advocates for redesigning systems in which AI enhances meaningful signals instead of obscuring them, improving overall user experience and information delivery.
Category: Newsletter
5. Qilin ransomware group exfiltrated 300GB of data from Corner…
Qilin ransomware group exfiltrated 300GB of data from Cornerstone Staffing Solutions, including 120,000 resumes, Social Security numbers, salary data, and financial records, with threats of sophisticated phishing campaigns.
Category: Newsletter
6. EchoGram exploits gaps in training data guardrails by inject…
EchoGram exploits gaps in training data guardrails by injecting nonsensical “flip tokens” that cause false positives and bypasses in GPT-5.1, Claude, and Gemini, posing a dual threat of alert fatigue and actual malicious prompt bypasses.
Category: Newsletter
7. The RondoDox botnet leverages a vulnerability in the XWiki S…
The RondoDox botnet leverages a vulnerability in the XWiki SolrSearch endpoint, sending base64-encoded Groovy payloads via HTTP GET requests to download and execute malware. Existing IOC blocklists remain effective against this threat.
Category: Newsletter
8. Kite declutters Gmail inboxes by automating responses and st…
Kite declutters Gmail inboxes by automating responses and streamlining workflows, boosting user productivity securely and efficiently.
Category: Newsletter
9. A security breach at Mixpanel exposed OpenAI API user metada…
A security breach at Mixpanel exposed OpenAI API user metadata, affecting API users but not ChatGPT users. Exposed data included names, emails, location data, and user IDs. OpenAI removed Mixpanel and is auditing vendor security.
Category: Newsletter
10. AI-generated articles have surpassed human-written content o…
AI-generated articles have surpassed human-written content online, though such articles are less visible in Google search and ChatGPT results due to lower search performance.
Category: Newsletter
11. Replit enables designers to transform creative concepts into…
Replit enables designers to transform creative concepts into fully functional, interactive applications, supporting the development of prototypes and projects without extensive coding.
Category: Newsletter
12. QA Wolf offers a platform enabling rapid, automated end-to-e…
QA Wolf offers a platform enabling rapid, automated end-to-end test coverage for web and mobile apps, achieving 80% test coverage in weeks, unlimited parallel test runs, and maintenance with zero flaky tests to accelerate QA cycles significantly.
Category: Newsletter
13. The open-source SmartTube YouTube client for Android TV was …
The open-source SmartTube YouTube client for Android TV was compromised after attackers accessed the developer’s signing keys. The developer has revoked the old signature and plans to release a new version under a separate app ID to restore security.
Category: Newsletter
14. Security flaws in AWS SageMaker allow attackers with certain…
Security flaws in AWS SageMaker allow attackers with certain permissions to inject malicious code using lifecycle configurations, similar to EC2 user data escalations. Detection of stop-modify-start sequences in CloudTrail and strict access control implementation are advised.
Category: Newsletter
15. Coupang revealed an unauthorized access incident that compromised 33
Coupang revealed an unauthorized access incident that compromised 33.7 million customer accounts, exposing sensitive personal information and order histories. Authorities suspect a Chinese ex-employee and are investigating violations of personal information protection laws.
Category: Newsletter