AI Applications in Cybersecurity

There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online. And here’s where to register to attend, or participate, in the fourth. Some really…

SmartLoader Malware Masquerades as Legitimate GitHub Repository to Infect Users

AhnLab Security Intelligence Center (ASEC) has uncovered a sophisticated campaign involving the massive dissemination of SmartLoader malware through GitHub repositories designed to mimic legitimate software projects. These repositories target users searching for popular illicit content such as game cheats, software…

Patch Tuesday Update – August 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 119 CVEs, including 8 republished CVEs. Overall, Microsoft announced 1 Zero-Day, 16 Critical, and 92 Important vulnerabilities. From an Impact perspective, Escalation of Privilege vulnerabilities accounted for 40%,…

Hackers Deploy Dedicated Phishlet for FIDO Authentication Downgrade Attacks

Proofpoint researchers have uncovered a novel technique allowing threat actors to bypass FIDO-based authentication through downgrade attacks, leveraging a custom phishlet within adversary-in-the-middle (AiTM) frameworks. This method exploits gaps in browser compatibility and user agent handling, forcing victims to revert…