Researchers have uncovered a multi-stage exploit in Anthropic’s Claude.ai platform that enables attackers to steal sensitive data and redirect users to malicious sites—all without detection. The attack, dubbed 'Claudy Day,' leverages invisible prompt injection, open redirects, and trusted platform workflows to bypass security controls.
A new Android malware, Perseus, is targeting users’ note-taking apps to steal passwords and financial data, spreading through fake IPTV streaming apps. Here’s what you need to know about this evolving threat.
Hackers are turning AI tools into cyber weapons, exploiting unsecured OpenWebUI servers to deploy advanced malware and steal data worldwide. Discover how a single misconfiguration enabled a new wave of stealthy, AI-powered cyberattacks.
Researchers uncovered a three-pronged attack chain in Claude AI that allowed attackers to hijack search results, inject hidden commands, and exfiltrate user data—posing serious risks for enterprise users.
As ransomware profits plummet, cybercriminals are ditching encryption for aggressive data theft and extortion. Google’s 2025 report exposes the latest tactics and what organizations must watch for next.
Ransomware attackers are adapting to shrinking profits by abandoning signature hacking tools in favor of stealthy, built-in system features, making them harder to detect as they pressure victims with data leaks.
With classic ransomware payments drying up, cybercriminals are reinventing themselves—shifting to data theft, public shaming, and targeting smaller businesses in a new wave of high-pressure extortion.
OpenClaw AI agents are under fire after researchers revealed how attackers can exploit prompt injection and messaging app link previews to silently siphon sensitive data—no clicks required. Our investigation explains the attack, the risks, and how organizations can defend themselves.
Researchers uncovered six fake OphimCMS themes on Packagist hiding trojanized jQuery payloads. The attack exposed movie streaming sites and their visitors to data leaks, ad injection, and dangerous redirects, highlighting a new supply chain threat.
A stealthy INC ransomware attack reveals how hackers used legitimate Windows tools and a disguised backup utility to steal data before encrypting systems. Investigators warn of a rising trend in 'living off the land' techniques that blur the line between routine IT operations and cybercrime.