Ransomware & Malware

Password Managers Under Fire While Secrets Leak Everywhere: This Week's Reality Check

Password Managers Under Fire While Secrets Leak Everywhere: This Week’s Reality Check

You know that feeling when you realize the tools you trust most might not be as bulletproof as you thought? That’s exactly what hit me this week while digging through some sobering security research that should make all of us pause and reassess our assumptions.

When Your Password Manager Becomes the Problem

Let’s start with the elephant in the room. Researchers at ETH Zurich just published findings that should make anyone using Bitwarden, LastPass, Dashlane, or 1Password sit up and take notice. They discovered that these password managers can be vulnerable to vault compromise when faced with a malicious server scenario.

AI-Powered Attacks Hit FortiGate Firewalls While Healthcare Systems Reel from Ransomware

AI-Powered Attacks Hit FortiGate Firewalls While Healthcare Systems Reel from Ransomware

The past week has been a stark reminder that our security challenges are getting more sophisticated – and more personal. While we’re seeing AI being weaponized against network infrastructure, healthcare systems are facing devastating ransomware attacks that directly impact patient care. Let me walk you through what’s happening and why it matters for all of us.

When AI Becomes the Attacker’s Tool

The most concerning development this week comes from AWS researchers who’ve identified hundreds of FortiGate firewalls being compromised through AI-powered attacks. This isn’t just another vulnerability disclosure – it’s a glimpse into how threat actors are evolving their methods.

Supply Chain Attacks and State Network Breaches: Why This Week's Security News Should Keep You Up at Night

Supply Chain Attacks and State Network Breaches: Why This Week’s Security News Should Keep You Up at Night

I’ve been digging through this week’s security incidents, and honestly, the pattern emerging here is pretty concerning. We’re seeing attackers hit critical infrastructure from multiple angles – from state government networks to the semiconductor supply chain – and they’re getting more sophisticated about it.

Romanian Hacker Exposes How Easy State Networks Really Are

Let’s start with the most straightforward case: Catalin Dragomir just pleaded guilty to selling access to an Oregon state government office’s network. Now, we don’t have all the technical details yet, but this case highlights something I’ve been worried about for years – state and local government networks are often sitting ducks.

When Server-Side Control Breaks Password Manager Security: What This Week's Research Really Means

When Server-Side Control Breaks Password Manager Security: What This Week’s Research Really Means

You know that moment when someone challenges something you’ve always believed to be true? That’s exactly what happened to me reading Bruce Schneier’s latest post about password manager security research. We’ve all been telling users that password managers with zero-knowledge architecture are bulletproof – that even if the company gets compromised, your data stays safe. Turns out, it’s more complicated than that.

That Shai-Hulud Worm Shows Why Our Supply Chain Problem Just Got Worse

That Shai-Hulud Worm Shows Why Our Supply Chain Problem Just Got Worse

I’ve been watching the security feeds this week, and honestly, the npm ecosystem attack that’s been making rounds has me more concerned than usual. We’re dealing with a supply chain worm that researchers are calling “Shai-Hulud-like” – and if you’re thinking Dune references in malware naming have gotten out of hand, you’re not wrong. But the technical implications here are genuinely unsettling.

When AI Gets Too Helpful: Microsoft's Copilot Bug Shows Why Zero Trust Matters More Than Ever

When AI Gets Too Helpful: Microsoft’s Copilot Bug Shows Why Zero Trust Matters More Than Ever

I’ve been tracking some concerning developments this week that really highlight how our threat landscape is shifting. The most eye-catching story involves Microsoft Copilot accidentally summarizing confidential emails, but when you look at it alongside the other incidents, there’s a bigger pattern here about trust boundaries and how they’re breaking down.

The Copilot Problem: When Your AI Assistant Becomes a Data Leak

Let’s start with the Microsoft issue because it’s probably affecting some of you right now. Since late January, Microsoft 365 Copilot has been summarizing confidential emails that should have been blocked by data loss prevention policies. Microsoft calls it a bug, but honestly, this feels like an inevitable collision between AI convenience and security controls.

From African Cybercrime Busts to Chrome Zero-Days: What This Week's Security News Tells Us

From African Cybercrime Busts to Chrome Zero-Days: What This Week’s Security News Tells Us

You know those weeks where the security news feels like it’s coming at you from all directions? This has been one of those weeks. Between major law enforcement operations, high-profile acquisitions, and yet another Chrome zero-day, there’s a lot to unpack. Let me walk you through what caught my attention and why it matters for those of us in the trenches.

Device Code Phishing Gets a Voice: Why Microsoft Entra Users Are Getting Unexpected Phone Calls

Device Code Phishing Gets a Voice: Why Microsoft Entra Users Are Getting Unexpected Phone Calls

I’ve been tracking an interesting evolution in phishing tactics lately, and frankly, it’s got me concerned about how attackers are getting more sophisticated with their social engineering. We’re seeing threat actors combine device code phishing with old-school voice calls to compromise Microsoft Entra accounts, and it’s working disturbingly well.

The New Hybrid Attack

Here’s what’s happening: attackers are targeting organizations in tech, manufacturing, and finance with a clever two-step process. First, they send the typical device code phishing email asking users to authenticate via a device code. But here’s the twist – they’re following up with actual phone calls (vishing) to walk victims through the process.

AI-Powered Malware and Targeted Attacks: What This Week's Incidents Tell Us About Evolving Threats

AI-Powered Malware and Targeted Attacks: What This Week’s Incidents Tell Us About Evolving Threats

Hey everyone – I’ve been digging through this week’s security incidents, and there are some interesting patterns emerging that I think we should all be paying attention to. We’re seeing everything from AI-assisted malware experiments to state-sponsored campaigns targeting activists, and it’s painting a pretty clear picture of where threat actors are heading in 2026.

The AI Malware Experiment That Fizzled Out

Let’s start with something that caught my eye: the Arkanix Stealer operation. This one’s fascinating because it appears to have been developed as an AI-assisted experiment that was promoted on dark web forums toward the end of 2025, but then just… disappeared.

Texas Takes TP-Link to Court While Chinese APTs Keep Busy: This Week's Reality Check

Texas Takes TP-Link to Court While Chinese APTs Keep Busy: This Week’s Reality Check

You know that feeling when you read the week’s security news and think “well, that escalated quickly”? That’s exactly where I am after diving into this week’s developments. Between state governments filing lawsuits over router security and Chinese threat actors having a field day with zero-days, it’s been quite the ride.

When States Start Suing Router Companies

Let’s start with the big one: Texas is suing TP-Link over what they’re calling deceptive marketing practices around router security. The lawsuit alleges that TP-Link has been marketing their routers as secure while Chinese state-backed hackers have been exploiting firmware vulnerabilities to access user devices.