Vulnerabilities & Patches

When AI Becomes the Perfect Scammer: Google Coin and Other Security Wake-Up Calls

When AI Becomes the Perfect Scammer: Google Coin and Other Security Wake-Up Calls

You know that feeling when you see a scam so well-crafted it makes you pause and think “okay, that’s actually clever”? That’s exactly what happened when I read about the latest crypto scam targeting Google’s Gemini chatbots. Attackers have created a fake “Google Coin” presale site complete with an AI assistant that delivers incredibly convincing sales pitches to potential victims.

ClickFix Campaigns Get Creative While Industrial Networks Face Growing Ransomware Pressure

ClickFix Campaigns Get Creative While Industrial Networks Face Growing Ransomware Pressure

The threat landscape keeps evolving, and this week brought some particularly interesting developments that caught my attention. From creative malware delivery techniques to major arrests and infrastructure outages, there’s quite a bit to unpack.

ClickFix Attacks Take an Unexpected Turn

The most technically fascinating story this week involves ClickFix campaigns adopting a clever new approach to malware delivery. Instead of relying on traditional methods, attackers are now abusing DNS lookup commands to deliver ModeloRAT.

When Attackers Take the Path of Least Resistance: RMM Tools Become the New Malware

When Attackers Take the Path of Least Resistance: RMM Tools Become the New Malware

I’ve been watching an interesting shift in how attackers operate, and it’s forcing us to rethink some fundamental assumptions about threat detection. Instead of crafting sophisticated malware that might get caught by our defenses, threat actors are increasingly just using the legitimate tools we already have installed in our environments.

The most striking example? Remote monitoring and management (RMM) software abuse is absolutely exploding. According to recent research from Dark Reading, hackers are ditching traditional malware in favor of these legitimate administrative tools because they offer something malware struggles with: stealth, persistence, and operational efficiency.

AI is Supercharging Both Attackers and Attack Surfaces – Here's What We're Seeing

AI is Supercharging Both Attackers and Attack Surfaces – Here’s What We’re Seeing

I’ve been watching this week’s security news, and there’s a clear pattern emerging that should make all of us sit up and take notice. AI isn’t just changing how we defend systems – it’s fundamentally reshaping the threat landscape in ways that are both more sophisticated and, paradoxically, more accessible to low-skill attackers.

Let me walk you through what happened this week and why it matters for how we think about security going forward.

When Nation-States Hit Telcos and AI Tools Become C2 Channels: This Week's Security Reality Check

When Nation-States Hit Telcos and AI Tools Become C2 Channels: This Week’s Security Reality Check

You know those weeks when the security news feels like it’s coming from three different timelines? We just had one of those. While Singapore was fending off sophisticated Chinese hackers targeting their telecom infrastructure, researchers were busy figuring out how to turn Microsoft Copilot into a command-and-control proxy. Meanwhile, Spanish courts decided VPNs should block piracy sites, and we got some genuinely good news about Android’s security posture.

Passkeys, Police Partnerships, and a Fresh Wave of Mobile Threats: This Week's Security Roundup

Passkeys, Police Partnerships, and a Fresh Wave of Mobile Threats: This Week’s Security Roundup

Hey everyone – quite a week for security news, and I wanted to share some thoughts on a few stories that caught my attention. We’ve got everything from the ongoing passkey transition to Amazon backing down from a controversial surveillance partnership, plus some nasty new threats targeting our mobile devices.

The Passkey Transition Gets Real (And Compliance-Focused)

The shift from passwords to passkeys isn’t just a nice-to-have anymore – it’s becoming a compliance necessity. A recent piece from BleepingComputer dives into how organizations are navigating passkey adoption while staying aligned with ISO 27001 requirements.

When Good Intentions Meet Bad Laws: Why Security Research Needs Better Legal Protection

When Good Intentions Meet Bad Laws: Why Security Research Needs Better Legal Protection

Last week’s arrest of a Dutch man who discovered police data exposed online perfectly captures one of our field’s most frustrating contradictions. While we’re telling organizations to embrace responsible disclosure and work with security researchers, the legal system keeps treating discovery as a crime.

The Dutch Data Dilemma

Here’s what happened: Dutch police accidentally made confidential documents publicly accessible online. A 40-year-old man found them, downloaded the files, and then made a critical mistake—he asked for “something in return” before agreeing to delete them. The authorities arrested him.

Password Managers Under Fire and Why Your SME Clients Can't Hide in Plain Sight

Password Managers Under Fire and Why Your SME Clients Can’t Hide in Plain Sight

I’ve been digging through this week’s security news, and honestly, it feels like we’re watching some of our fundamental assumptions get challenged. Between password managers showing cracks in their armor and small businesses still thinking they’re invisible to attackers, there’s a lot to unpack here.

Password Managers: The Tools We Trust Most Are Getting Tested

Let’s start with what might be the most unsettling news for those of us who’ve been preaching the password manager gospel. Researchers just published findings showing that major cloud-based password managers—including Bitwarden, Dashlane, and LastPass—are vulnerable to password recovery attacks under specific conditions.

AI Gets Weaponized While Zero-Days Keep Landing: What This Week's Attacks Tell Us

AI Gets Weaponized While Zero-Days Keep Landing: What This Week’s Attacks Tell Us

Coffee’s getting cold again as I dig through this week’s security news, and honestly, the patterns emerging are worth talking about. We’re seeing AI move from theoretical threat to active weapon, while the same old vulnerabilities continue to bite organizations where it hurts most.

When AI Becomes the Attack Vector

Google’s Threat Intelligence Group dropped some sobering news about their own Gemini AI being abused by hackers across all attack stages. This isn’t just script kiddies playing around – we’re talking about systematic AI model extraction attacks where threat actors use legitimate API access to probe and essentially clone the reasoning capabilities of these models.

Chrome Extension Malware Hits 300K Users While Microsoft Preps Major Security Boot Update

Chrome Extension Malware Hits 300K Users While Microsoft Preps Major Security Boot Update

I’ve been tracking some interesting developments this week that really highlight how attackers are getting creative with their delivery methods. The biggest story that caught my attention involves a massive Chrome extension campaign that managed to fool over 300,000 users – and it’s a perfect example of how threat actors are riding the AI hype wave.

AI-Themed Extensions Hide Credential Theft Operation

Here’s what happened: security researchers discovered 30 malicious Chrome extensions masquerading as AI assistants that were actively stealing credentials, email content, and browsing data from users. What makes this particularly concerning is the scale – we’re talking about more than 300,000 installations across these fake extensions.