Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern

Kubernetes has become a popular choice for enterprise software development, attracting increased attacks from cybercriminals using sophisticated exploits. Newly created Kubernetes clusters can be targeted by malicious scans within minutes, with attackers employing automated methods to find and exploit vulnerabilities.

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Hackers have reportedly weaponized Anthropic's Claude AI model to assist in a cyberattack against the Mexican government. The AI was allegedly used to generate exploit code, develop malicious tools, and facilitate the exfiltration of over 150GB of sensitive data.

Who is the Kimwolf Botmaster “Dort”?

This article investigates the identity of "Dort," the individual believed to be the botmaster behind Kimwolf, a massive botnet responsible for significant disruptive attacks. Following the disclosure of a vulnerability that enabled the creation of Kimwolf, Dort has orchestrated retaliatory DDoS, doxing, and harassment campaigns against those involved in exposing the botnet.

Canadian Tire Data Breach Impacts 38 Million Accounts

Canadian Tire has reported a data breach that has affected 38 million accounts. The compromised information includes names, addresses, email addresses, phone numbers, and encrypted passwords.

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

The U.S. Department of Defense has designated AI company Anthropic as a "supply chain risk" due to disagreements over the lawful use of its AI model, Claude. The dispute centers on Anthropic's refusal to allow its AI for mass domestic surveillance of Americans and fully autonomous weapons.

Security hole could let hackers take over Juniper Networks PTX core routers

A critical vulnerability in Juniper Networks PTX series routers running Junos OS Evolved could allow an unauthenticated attacker to execute code with root privileges. The vulnerability, which lies in the On-Box Anomaly detection framework, affects versions earlier than 25.4R1-S1-EVO and 25.4R2-EVO, but not the standard Junos OS.

‘Silent’ Google API key change exposed Gemini AI data

Researchers at Truffle Security discovered that Google Cloud API keys, traditionally used for billing, now also authenticate access to Gemini AI project data due to a silent change by Google. This allows anyone who scrapes the API keys from websites to access uploaded files, cached content, and consume tokens, potentially generating large bills for project owners.

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

AI assistants designed to find software vulnerabilities are showing promise, but current versions are not meeting the expectations of enterprises and developers. Experts note that these tools struggle with speed and accuracy, limiting their effectiveness in real-world security assessments.

APT37 hackers use new malware to breach air-gapped networks

The North Korean APT37 hacking group is using new malware, delivered via removable drives, to bridge air-gapped networks and conduct covert surveillance. This new toolset allows them to move data between connected and isolated systems.

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Over 900 Sangoma FreePBX instances are still compromised with web shells following attacks that exploited a command injection vulnerability that began in December 2025. The majority of infected instances are located in the U.S., followed by Brazil, Canada, Germany, and France. The compromises were discovered by the Shadowserver Foundation.

The Case for Why Better Breach Transparency Matters

The article discusses the lack of transparency in data breach disclosures by organizations. It argues that disclosing the bare minimum, or not disclosing at all, has become a common practice.

Ransomware payments cratered in 2025, but attacks surged to record highs

Ransomware payments significantly decreased in 2025, despite a surge in the number of ransomware attacks reaching record levels. This suggests that while attacks are becoming more frequent, victims are less willing or able to pay the ransom demands, possibly due to improved defenses or a shift in attacker tactics.

CISA warns that RESURGE malware can be dormant on Ivanti devices

CISA has released information regarding RESURGE malware, used in conjunction with the CVE-2024-1709 exploit, targeting Ivanti Connect Secure devices. RESURGE is a malicious implant that can remain dormant on compromised systems.

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module, disguised as a legitimate crypto library, steals passwords entered in the terminal and deploys the Rekoobe backdoor on Linux systems. The module, github[.]com/xinfeisoft/crypto, mimics the 'golang.org/x/crypto' codebase but contains malicious code for data exfiltration and backdoor deployment.

French DIY etailer ManoMano admits customer data stolen

French DIY etailer ManoMano admitted that customer data was stolen after a cyberattack hit one of its customer support subcontractors in January. The attackers claim to have stolen data from over 37 million accounts, a significantly larger number than ManoMano initially suggested.

The Anthropic and US Government conflict is larger than you think

The article discusses the complex relationship between Anthropic, an AI company, and the US government, particularly concerning data privacy, surveillance, and national security interests. It highlights potential conflicts arising from government access to Anthropic's AI models and the implications for individual privacy and civil liberties.

Claude Code Security Shows Promise, Not Perfection

The article discusses the security implications of Claude Code, an AI tool. While it shows promise in code security, researchers caution that its impact may have been overstated and that it's not perfect.

One of the ‘most influential cybersecurity’ roles will pay under $175,000

A job posting by the UK's GCHQ for a Chief Information Security Officer, described as a highly influential role, offers a maximum salary of £130,000 (approximately $175,000). This salary is considered low compared to industry standards for similar positions, especially considering the responsibilities involved in securing a nation from cyber threats.

900 Sangoma FreePBX Instances Infected With Web Shells

Approximately 900 Sangoma FreePBX instances have been infected with web shells. The attacks leveraged a post-authentication command injection vulnerability present in the endpoint manager interface.

Ukrainian man pleads guilty to running AI-powered fake ID site

A Ukrainian man has pleaded guilty to running OnlyFake, an AI-powered website that generated and sold fake identification documents. The website generated over 10,000 fake ID photos, highlighting the misuse of AI in enabling fraudulent activities.

Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

A fake FedEx email is being used to deliver malware instead of just redirecting users to phishing sites. The email claims to be a delivery notification but contains a malicious payload.

Why Tehran’s Two-Tiered Internet Is So Dangerous

The article discusses Iran's internet shutdown in January 2026, which was more severe than previous shutdowns. Unlike prior incidents, even the National Information Network (NIN), Iran's domestic intranet, was affected, impacting banking and administrative sectors.

Phishing Attacks Against People Seeking Programming Jobs

North Korean hackers are posing as recruiters to target job seekers in the programming field. They lure candidates into running malicious code during coding challenges, which installs malware on their systems.

Your personal OpenClaw agent may also be taking orders from malicious websites

Researchers at Oasis Security discovered a vulnerability chain, dubbed ClawJacked (CVE-2026-25253), in OpenClaw that allows malicious websites to gain full control of a locally running agent by exploiting the implicit trust of "localhost" connections. By bypassing rate limits and enabling unauthorized device pairing, attackers can access the agent's privileges, workflows, and credentials. OpenClaw promptly fixed the flaw after being notified.

Juniper Networks PTX Routers Affected by Critical Vulnerability

Juniper Networks has released an out-of-band security update for Junos OS Evolved to address a remote code execution vulnerability, CVE-2026-21902, affecting PTX routers. This vulnerability requires immediate patching to prevent potential exploitation.

Ransomware groups switch to stealthy attacks and long-term access

Ransomware groups are shifting tactics towards stealthy infiltration and long-term access, focusing on data exfiltration and the threat of public exposure as their main extortion mechanism. They are using defense evasion and persistence techniques, routing command-and-control traffic through trusted enterprise services to blend in with normal business traffic, and chaining vulnerabilities for greater impact.

Risky Bulletin: Russian man investigated for extorting Conti ransomware group

This article summarizes several cybersecurity incidents, including the investigation of a Russian man for extorting the Conti ransomware group, the takedown of a Chinese espionage operation by Google, the hacking of the Mexican government using Claude, and the discovery of a Cisco zero-day exploited for three years.

Marquis v. SonicWall Lawsuit Ups the Breach Blame Game

A FinTech company is suing SonicWall after suffering a breach, raising questions about the responsibility of third-party security vendors when their products fail to prevent attacks. The lawsuit highlights the complex issue of liability in cybersecurity incidents involving multiple parties.

Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

A zero-day vulnerability, CVE-2026-20127, in Cisco SD-WAN has been under exploitation for three years by a sophisticated, unknown threat actor. The vulnerability is considered to be of maximum severity and the attacker left very little trace of their activities.

Previously harmless Google API keys now expose Gemini AI data

Google API keys, initially intended for services like Maps and embedded in client-side code, can now be exploited to authenticate to the Gemini AI assistant. This access could potentially expose private user data stored within Gemini.

Trend Micro warns of critical Apex One code execution flaws

Trend Micro has addressed two critical remote code execution (RCE) vulnerabilities in its Apex One security software. Successful exploitation of these flaws could allow attackers to execute arbitrary code on affected Windows systems.