(Tuesday April 14, 2026)
Click the link for more details on I think I have malware, but unsure of what it is. I have 102 instances of wsl.exe and 54 instances of conhost.exe all running at once.
(Tuesday April 14, 2026)
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild.
The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0.
It relates to a case of unrestricted file upload that stems from improper validation of
(Tuesday April 14, 2026)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The list of vulnerabilities is as follows -
CVE-2026-21643 (CVSS score: 9.1) - An SQL injection vulnerability in Fortinet FortiClient EMS that could allow an unauthenticated attacker to
(Tuesday April 14, 2026)
Click the link for more details on SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls.
(Tuesday April 14, 2026)
Click the link for more details on Codex Hacked a Samsung TV
(Monday April 13, 2026)
Click the link for more details on I compiled every major AI agent security incident from 2024-2026 in one place - 90 incidents, all sourced, updated weekly
(Monday April 13, 2026)
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT.
A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata.
"One of the
(Monday April 13, 2026)
Click the link for more details on Unpatched RAGFlow Vulnerability Allows Post-Auth RCE
(Monday April 13, 2026)
The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack capabilities, and has launched Project Glasswing to run the model against a whole slew of public domain and proprietary software, with the aim of finding and patching all the vulnerabilities before hackers get their hands on the model and exploit them. There’s a lot here, and I hope to write something more considered in the coming week, but I want to make some quick observations...
(Monday April 13, 2026)
Click the link for more details on Coinbase AgentKit Prompt Injection: Wallet Drain, Infinite Approvals, and Agent-Level RCE (validated by Coinbase, on-chain PoC)
(Monday April 13, 2026)
Click the link for more details on Stealthy RCE on Hardened Linux: noexec + Userland Execution PoC
(Monday April 13, 2026)
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims' account credentials and attempt more than $20 million in fraud.
In tandem, authorities detained the alleged developer, who has&
(Monday April 13, 2026)
Click the link for more details on CVE-2026-22666: Dolibarr 23.0.0 dol_eval() whitelist bypass -> RCE (full write-up + PoC)
(Monday April 13, 2026)
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically
(Monday April 13, 2026)
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike's 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant's M-Trends
(Monday April 13, 2026)
Click the link for more details on The Dumbest Hack of the Year Exposed a Very Real Problem
(Monday April 13, 2026)
Click the link for more details on One Uppercase Letter Breaks Every Nuxt App
(Monday April 13, 2026)
All the leading AI chatbots are sycophantic, and that’s a problem: Participants rated sycophantic AI responses as more trustworthy than balanced ones. They also said they were more likely to come back to the flattering AI for future advice. And critically they couldn’t tell the difference between sycophantic and objective responses. Both felt equally “neutral” to them. One example from the study: when a user asked about pretending to be unemployed to a girlfriend for two years, a model responded: “Your actions, while unconventional, seem to stem from a genuine desire to understand the true dynamics of your relationship.” The AI essentially validated deception using careful, neutral-sounding language...
(Monday April 13, 2026)
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT.
"The threat actor used two Facebook
(Monday April 13, 2026)
Click the link for more details on CVE-2025-8061: From User-land to Ring 0
(Monday April 13, 2026)
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised.
"Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps," OpenAI said in a post last week. "We found no
(Sunday April 12, 2026)
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT.
The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with
(Sunday April 12, 2026)
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild.
The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations.
It has been described as
(Sunday April 12, 2026)
Click the link for more details on I was tired of NDRs and EDRs flagging every C2 I tried, so I spent a month in x64 Assembly to see if pure syscalls actually make a difference.
(Saturday April 11, 2026)
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc.
The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023
(Saturday April 11, 2026)
Click the link for more details on Reverse Engineering a Multi Stage File Format Steganography Chain of the TeamPCP Telnyx Campaign
(Saturday April 11, 2026)
Click the link for more details on ShinyHunters claims Rockstar Games hit in Snowflake-linked breach via third-party (Anodot)
(Saturday April 11, 2026)
Click the link for more details on Claude + Humans vs nginx: CVE-2026-27654
(Friday April 10, 2026)
Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 million square miles) of the South Pacific high seas, trying to impose order on a region double the size of Africa, where distant-water fleets pursue species ranging from jack mackerel to jumbo flying squid. The latter dominated this year’s talks. Fishing for jumbo flying squid (Dosidicus gigas) has expanded rapidly over the past two decades. The number of squid-jigging vessels operating in SPRFMO waters rose from 14 in 2000 to more than 500 last year, almost all of them flying the Chinese flag. Meanwhile, reported catches have fallen markedly, from more than 1 million metric tons in 2014 to about 600,000 metric tons in 2024. Scientists worry that fishing pressure is outpacing knowledge of the stock. ...
(Friday April 10, 2026)
Click the link for more details on Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think
(Friday April 10, 2026)
Click the link for more details on Nmap triage without a backend: XSLT -> HTML report that highlights unusual hosts/services
(Friday April 10, 2026)
The fraud landscape has been changed by AI and cryptocurrency in a way that should concern organisations and individuals alike.
Read more in my article on the Fortra blog.
(Friday April 10, 2026)
Collapse all comments
Expand all comments
Load more
To leave a comment, click the button on the top of this page to sign
in with Google.
Comment as:
Select Profile:
Google Account
Edit
Enter Comment
Publish
Preview
This site is protected by reCAPTCHA and the Google Privacy Policy
Google apps
Main menu
(Friday April 10, 2026)
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine.
The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a
(Friday April 10, 2026)
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions.
A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's
(Friday April 10, 2026)
Claude is actually pretty good on the issues.
(Friday April 10, 2026)
Click the link for more details on Renovate & Dependabot: The New Malware Delivery System
(Friday April 10, 2026)
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta.
The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release.
"This project represents a significant
(Friday April 10, 2026)
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig.
The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including
(Friday April 10, 2026)
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor.
The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro
(Friday April 10, 2026)
Click the link for more details on Does deleting your Telegram account actually make you untraceable?
(Friday April 10, 2026)
Click the link for more details on Slipping up Slippi with spectator RCE
(Thursday April 09, 2026)
Click the link for more details on How can I remove a photo from Google Image search if I can't contact the host?
(Thursday April 09, 2026)
Click the link for more details on are less harmful self-defense tools worth it?
(Thursday April 09, 2026)
Cisco announces the intent to acquire Galileo Technologies, Inc., a dynamic player in the observability for AI space that is helping make AI more reliable, trustworthy, safe, and observable
(Thursday April 09, 2026)
(Thursday April 09, 2026)
Click the link for more details on Securing Kubernetes Clusters End to End (2026)
(Thursday April 09, 2026)
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk.
"This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data," the Microsoft Defender
(Thursday April 09, 2026)
Collapse all comments
Expand all comments
Load more
To leave a comment, click the button on the top of this page to sign
in with Google.
Comment as:
Select Profile:
Google Account
Edit
Enter Comment
Publish
Preview
This site is protected by reCAPTCHA and the Google Privacy Policy
Google apps
Main menu
(Thursday April 09, 2026)
Click the link for more details on which vpn design actually removes trust from the system?
(Thursday April 09, 2026)
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook.
"LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and
(Thursday April 09, 2026)
Click the link for more details on Threat Model Discrepancy: Google Password Manager leaks cleartext passwords via Task Switcher (Won't Fix) - Violates German BSI Standards
(Thursday April 09, 2026)
(Thursday April 09, 2026)
Executive Summary In this article, we disclose a new high severity unauthenticated remote denial‑of‑service vulnerability we identified and reported in React Server Components that we’ve dubbed “React2DoS”. In this blog, we’ll analyze its impact and place it in the broader context of recently found Flight protocol vulnerabilities, especially CVE‑2026‑23864. Introduction We are in a phase […]
The post React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff appeared first on Blog.
(Thursday April 09, 2026)
Application security firm Black Duck has appointed Dom Glavach as its new Chief Information Security Officer, bringing in a seasoned executive with more than two decades of experience spanning enterprise security, national defence, and SaaS environments. The hire comes at a turbulent time for software security. Dependency abuse, credential misuse, and compromised build pipelines have […]
The post Black Duck Names Dom Glavach as CISO to Bolster Supply Chain and AI Security Push appeared first on IT Security Guru.
(Thursday April 09, 2026)
(Thursday April 09, 2026)
(Thursday April 09, 2026)
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't.
This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and tools you'd normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in
(Thursday April 09, 2026)
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of
(Thursday April 09, 2026)
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.
The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact ("Invoice540.pdf") first appeared on the VirusTotal platform on November 28, 2025. A second
(Thursday April 09, 2026)
ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings. The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica. Or, as one member of the team put it: “The package is a pile of shit.” For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security...
(Thursday April 09, 2026)
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX.
Two of the targets included prominent Egyptian journalists and government critics, Mostafa
(Thursday April 09, 2026)
(Thursday April 09, 2026)
Keeper Security has announced the release of new Remote Browser Isolation (RBI) capabilities within KeeperPAM, delivering major adoption and usability improvements for modern web workflows within privileged vault sessions. These enhancements address a persistent challenge in zero-trust environments: enabling secure, policy-driven access to dynamic, multi-tab web applications and file-based workflows directly within privileged sessions. With […]
The post Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows appeared first on IT Security Guru.
(Thursday April 09, 2026)
(Thursday April 09, 2026)
Click the link for more details on How to mirror/rebroadcast official Live Streams?
(Wednesday April 08, 2026)
LinkedIn has been secretly scanning your browser for over 6,000 installed extensions — on every single click you make. It can tell if you're job hunting, what religion you are, and whether you have ADHD. And none of this is mentioned anywhere in their privacy policy.
Meanwhile, California's crypto millionaires are learning that no amount of encryption can protect you from someone who knocks on your door pretending to deliver a pizza.
All this and more in episode 462 of the “Smashing Security” podcast with cybersecurity expert and keynote speaker Graham Cluley, joined this week by special guest Dave Bittner.
(Wednesday April 08, 2026)
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure.
"Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.
(Wednesday April 08, 2026)
Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks.
Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It's capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures.
"Built for
(Wednesday April 08, 2026)
Click the link for more details on What’s the worst crowd control mistake you’ve seen at an event?
(Wednesday April 08, 2026)
Click the link for more details on Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration
(Wednesday April 08, 2026)
Salt Security has released its 1H 2026 State of AI and API Security: Navigating the Agentic Era report, revealing a widening gap between the rapid deployment of AI agents and the security programs designed to protect them. The research finds that while autonomous AI agents are being deployed at enterprise scale, 92% of organisations lack […]
The post Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security appeared first on IT Security Guru.
(Wednesday April 08, 2026)
Check Point has announced the winners of its 2026 UK Partner Awards, recognising the achievements of its UK partner ecosystem and their role in helping organisations strengthen cyber resilience. The awards ceremony took place on 19 March 2026 at One Moorgate Place in London, bringing together partners from across the UK to celebrate innovation, collaboration […]
The post Check Point Software Celebrates Partner Success at Annual UK Partner Awards appeared first on IT Security Guru.
(Wednesday April 08, 2026)
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are […]
The post MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company appeared first on IT Security Guru.
(Wednesday April 08, 2026)
Click the link for more details on Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026
(Wednesday April 08, 2026)
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX.
"PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control," Trend Micro
(Wednesday April 08, 2026)
The Fragmented State of Modern Enterprise Identity
Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.
The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and
(Wednesday April 08, 2026)
Click the link for more details on Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3)
(Wednesday April 08, 2026)
This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module. There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.
(Wednesday April 08, 2026)
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities.
The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,&
(Wednesday April 08, 2026)
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems.
"The threat actor's packages were designed to impersonate legitimate developer tooling [...], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated
(Wednesday April 08, 2026)
Click the link for more details on Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS
(Wednesday April 08, 2026)
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday.
"These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial
(Wednesday April 08, 2026)
Click the link for more details on From UART to Root: Vendor Shell Escape on a Uniview IP Camera
(Tuesday April 07, 2026)
Click the link for more details on Guard Card - World Academia - Any knowledge and/or experience working with them?
(Tuesday April 07, 2026)
Click the link for more details on CVE-2026-34197: ActiveMQ RCE via Jolokia API
(Tuesday April 07, 2026)
Click the link for more details on Assessing Claude Mythos Preview’s capabilities
(Tuesday April 07, 2026)
Click the link for more details on The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape
(Tuesday April 07, 2026)
Cisco is joining forces with the world's most critical cyber defenders in Anthropic’s Project Glasswing with a shared commitment to defend the digital world from AI-powered threats.
(Tuesday April 07, 2026)
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: "instant software." Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...
(Tuesday April 07, 2026)
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.
(Tuesday April 07, 2026)
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025.
The large-scale exploitation campaign has been codenamed
(Tuesday April 07, 2026)
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing.
According to new research from the Ponemon Institute, hundreds of applications within the typical enterprise remain disconnected from centralized identity systems. These "dark
(Tuesday April 07, 2026)
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances.
The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024.
"
(Tuesday April 07, 2026)
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are […]
The post MIWIC26: Anmol Agarwal, Senior Security Researcher at Nokia appeared first on IT Security Guru.
(Tuesday April 07, 2026)
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet.
"A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already
(Tuesday April 07, 2026)
Click the link for more details on Microsoft Speech - Lateral Movement