Vulnerabilities & Patches

AI-Powered Attacks Are Here, and They're Targeting Everything We Thought Was Secure

AI-Powered Attacks Are Here, and They’re Targeting Everything We Thought Was Secure

Remember when we used to worry about whether attackers would eventually use AI against us? Well, that future arrived faster than most of us expected. Looking at this week’s security news, it’s clear we’re dealing with a fundamental shift in how cyber threats operate – and honestly, it’s a bit unsettling.

When AI Agents Run Their Own Cyber Operations

The most eye-opening story comes from The Hacker News, which detailed how a state-sponsored group used an AI coding agent to run an autonomous espionage campaign against 30 targets. The AI wasn’t just helping with reconnaissance or writing some exploit code – it handled 80-90% of the tactical operations entirely on its own. We’re talking about an AI that could perform reconnaissance, write exploits, and attempt lateral movement at machine speed without human intervention.

PolyShell Attacks Hit Majority of Vulnerable Magento Stores as Identity Theft Reaches Industrial Scale

PolyShell Attacks Hit Majority of Vulnerable Magento Stores as Identity Theft Reaches Industrial Scale

We’re seeing some concerning patterns emerge this week that highlight just how quickly attackers can scale their operations when they find the right targets. The most immediate threat hitting e-commerce businesses is the ongoing PolyShell campaign, which has already compromised 56% of all vulnerable Magento stores – a staggering success rate that should have every online retailer checking their patch status right now.

GitHub's AI Security Push and Why Russian Arrests Actually Matter

GitHub’s AI Security Push and Why Russian Arrests Actually Matter

You know that feeling when you’re drowning in vulnerability reports and wondering if there’s got to be a better way? Well, GitHub thinks they have an answer, and honestly, it’s about time someone took a serious swing at this problem.

AI-Powered Bug Hunting Gets Real

GitHub just rolled out AI-based scanning for their Code Security tool, expanding way beyond their existing CodeQL static analysis. What caught my attention isn’t just the AI angle – everyone’s doing AI everything these days – but the fact that they’re specifically targeting broader language and framework coverage.

Ghost Campaigns and Harbor Defaults: Why This Week's Security News Should Make You Check Your Assumptions

Ghost Campaigns and Harbor Defaults: Why This Week’s Security News Should Make You Check Your Assumptions

You know that feeling when you think you’ve got everything locked down, and then reality comes knocking? This week’s security news is serving up a healthy dose of that reality check, with some particularly sneaky attack vectors that caught my attention.

The npm Ghost Campaign: When Install Logs Lie

Let’s start with the most creative attack I’ve seen in a while. Security researchers discovered what they’re calling the “Ghost Campaign” – a sophisticated npm supply chain attack that’s doing something I haven’t seen before: faking install logs to hide malicious activity.

Firefox Gets Free VPN While Attackers Perfect Their Social Engineering Game

Firefox Gets Free VPN While Attackers Perfect Their Social Engineering Game

It’s been quite a week in security news, and I wanted to share some thoughts on the stories that caught my attention. We’re seeing interesting developments on both the defensive and offensive sides – from Mozilla stepping up privacy protection to attackers getting increasingly creative with their delivery methods.

Mozilla Makes VPN Protection Mainstream

The biggest news for everyday users has to be Firefox’s new built-in VPN feature in version 149. Fifty gigabytes of monthly VPN traffic at no cost is genuinely impressive, especially when you consider that many people have never used a VPN at all.

FCC Drops the Hammer on Foreign Routers While Attackers Get Creative with Tax Season

FCC Drops the Hammer on Foreign Routers While Attackers Get Creative with Tax Season

Hey everyone – Emma here with some updates that caught my attention this week. We’ve got everything from sweeping policy changes to some pretty clever attack techniques that are worth discussing.

The Big Policy Move: FCC Says No More Foreign Routers

The biggest news this week is probably the FCC’s decision to ban all new consumer routers made outside the USA. They’ve updated their Covered List to include essentially any router manufactured in a foreign country, which is a pretty dramatic expansion from their previous approach of targeting specific companies or models.

TeamPCP's Supply Chain Spree and the AI Security Blind Spot We All Missed

TeamPCP’s Supply Chain Spree and the AI Security Blind Spot We All Missed

I’ve been tracking some concerning developments this week that highlight two major gaps in our security posture. While we’ve all been focused on traditional attack vectors, threat actors are exploiting both our software supply chains and our growing reliance on AI tools in ways that should make us all uncomfortable.

The TeamPCP Supply Chain Rampage Continues

TeamPCP is having quite the month. After successfully compromising Trivy and KICS, they’ve now set their sights on the popular LiteLLM Python package, and frankly, their execution is getting more sophisticated with each attack.

Supply Chain Attackers Target Developer Security Tools While Critical PLM Bug Demands Immediate Action

Supply Chain Attackers Target Developer Security Tools While Critical PLM Bug Demands Immediate Action

The past week has brought some unsettling news that really drives home how our threat landscape keeps shifting in unexpected ways. We’re seeing attackers go after the very tools we use to secure our code, while a critical RCE vulnerability in widely-used enterprise software is demanding immediate attention from security teams.

TeamPCP Goes After Our Security Tools

Here’s something that should make us all pause: the TeamPCP threat group has been systematically targeting popular security and development tools that many of us rely on daily. According to Dark Reading, they’ve hit Trivy, Checkmarx’s KICS code scanner, VS Code plugins, and the LiteLLM AI library.

When Security Tools Become Attack Vectors: This Week's Supply Chain Wake-Up Call

When Security Tools Become Attack Vectors: This Week’s Supply Chain Wake-Up Call

I’ve been following security news for years, but this week’s stories really highlight how creative attackers are getting with their targeting strategies. While everyone’s talking about the Crunchyroll breach affecting 6.8 million anime fans, the story that’s keeping me up at night is actually about Aqua’s Trivy vulnerability scanner getting compromised.

The Irony of Hacking Security Tools

Here’s what happened with Trivy: attackers managed to publish a malicious scanner release and actually replaced legitimate tags to point to information-stealer malware. Think about that for a second – security teams around the world are using vulnerability scanners to protect their infrastructure, and now those very tools are being weaponized against them.

TeamPCP's Multi-Front Attack: When Wipers Meet Supply Chain Compromise

TeamPCP’s Multi-Front Attack: When Wipers Meet Supply Chain Compromise

We’re seeing something interesting unfold this week that’s worth paying attention to. The TeamPCP hacking group has been making moves across multiple attack vectors simultaneously, and their latest campaign shows how threat actors are getting more sophisticated about targeting specific regions while compromising the tools we rely on daily.

The Kubernetes Wiper That Knows Geography

Let’s start with the most unusual piece: TeamPCP is deploying a wiper malware that specifically targets Iranian systems through Kubernetes clusters. What makes this particularly noteworthy isn’t just the geopolitical targeting—it’s the technical approach. The malicious script actually checks system configurations to identify Iranian infrastructure before wiping everything clean.