Back to Feed

Tag

Tools

50 items tagged #tools

Articles

‼️ Threat actor c00lssh is offering anonymous offshore VPS/RDP hosting services with various band...

Threat actor c00lssh advertises bulletproof VPS/RDP hosting services starting at $5.

Python Supply-Chain Compromise - Schneier on Security

Malicious .pth file discovered in litellm v1.82.8 PyPI package executes on Python startup.

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Claude Mythos AI model discovers thousands of zero-day vulnerabilities across major systems.

Grafana Patches AI Bug That Could Have Leaked User Data

Grafana patches AI vulnerability allowing data exfiltration via malicious web instructions.

Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything

Anthropic launches Project Glasswing consortium with 45+ orgs to test Claude Mythos Preview's cybersecurity

Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks

Anthropic unveils Claude Mythos, a frontier AI model that identifies thousands of zero-day vulnerabilities but risks

Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities

Tech giants launch Project Glasswing, an AI initiative to identify critical software vulnerabilities before malicious

Fortinet Issues Emergency Patch for FortiClient Zero-Day

Fortinet releases emergency patch for FortiClient authentication bypass zero-day CVE-2026-35616.

‼️ CVE-2026-35616: FortiClient EMS Pre-Auth API Bypass Under Active Exploitation https://t.co/YN...

CVE-2026-35616 FortiClient EMS pre-auth API bypass actively exploited in the wild.

Around 2 hours ago (01:22EST) it appears ILSpy WordPress domain was compromised to deliver malwar...

ILSpy WordPress domain compromised to deliver malware instead of legitimate tool.

‼️ Threat actor JINKUSU is selling the source code for EvilNote, a bulk email sending tool, for $...

Threat actor JINKUSU sells EvilNote malware source code for $500 on underground forum.

‼️ I have posted about this tool before, but this is a new forum post. A threat actor advertisin...

NFC RIPPER Android toolkit advertised for NFC relay attacks on payment terminals and ATMs.

How SentinelOne’s AI-powered EDR stops the Axios NPM supply chain attack autonomously and at mach...

SentinelOne's AI-powered EDR detected Axios NPM supply chain attack within 89 seconds of suspected North Korean

One of our researchers built an AI powered supply chain monitoring tool on a Friday afternoon. T...

Elastic Security Labs open-sources AI-powered supply chain monitoring tool that detected Axios npm compromise.

New CrystalRAT malware adds RAT, stealer and prankware features

CrystalRAT malware-as-a-service emerges on Telegram with RAT, stealer, and prankware capabilities.

Vulnerability & Patch Roundup — March 2026

WordPress ecosystem plugins patched for multiple medium/critical vulnerabilities in March 2026.

We built an AI-driven pipeline to reverse engineer hundreds of malware samples automatically. Un...

AI pipeline automatically reverse-engineers malware, uncovers Monero mining campaign earning $9K+ since 2023.

Anthropic Leaks 512,000 Lines of Claude AI Code in Major Blunder

Anthropic accidentally leaks 512,000 lines of Claude AI source code via npm package.

Good work by our teammate @_swachchhanda_ on publishing a dedicated Sigma rule set for the Axios...

Sigma detection rules published for Axios npm package compromise incident.

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

Threat actors increasingly abuse legitimate tools and native binaries to evade detection in 84% of high-severity

Google fixes fourth Chrome zero-day exploited in attacks in 2026

Google patches fourth Chrome zero-day (CVE-2026-5281) exploited in active attacks in 2026.

As usually, @smica83 uploaded a related sample to Bazaar: https://t.co/jt9HqNOAtA Active source u...

Malware sample disguised as BlueBeam Revu installer uploaded to Bazaar.

Claude Code source code accidentally leaked in NPM package

Anthropic accidentally leaked Claude Code source code via NPM package due to misconfigured build artifact.

GIGABYTE Control Center vulnerable to arbitrary file write flaw

GIGABYTE Control Center vulnerable to critical arbitrary file-write flaw enabling remote code execution.

Claude AI finds Vim, Emacs RCE bugs that trigger on file open

Claude AI discovers RCE vulnerabilities in Vim and GNU Emacs triggered by file open.

Elastic releases detections for the Axios supply chain compromise — Elastic Security Labs

Elastic releases detection rules for Axios npm package supply chain compromise

‼️ A cybercrime tool called "NetScan" is being advertised on a popular cybercrime forum, offering...

NetScan cybercrime tool advertised on darknet forum for vulnerability scanning and API key harvesting.

Apple adds macOS Terminal warning to block ClickFix attacks

Apple blocks ClickFix attacks in macOS Tahoe 26.4 with Terminal paste warnings.

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

LLMs can generate syntactically valid but semantically flawed access control policies, quietly expanding organizational

The NCSC is encouraging UK organisations to take immediate action to mitigate a recategorised vul...

NCSC urges UK organizations to mitigate recategorized F5 BIG-IP Access Policy Manager vulnerability.

‼️ A threat actor claims to be selling MailPro, an email campaign management panel featuring AI-a...

Threat actor selling MailPro, an AI-enabled email campaign management tool for spam and phishing.

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

Open VSX bug allows malicious VS Code extensions to bypass pre-publish security scans.

Web Shells: Types, Mitigation & Removal

Sucuri blog details web shell threats, types, and mitigation strategies for compromised web servers.

‼️A utility tool called "Logs Guru v1.4" is being advertised on a popular cybercrime forum, desig...

Logs Guru v1.4 utility tool advertised on cybercrime forum for processing stolen credentials.

Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android

Google announces Post-Quantum Cryptography integration in Android 17 with ML-DSA signatures.

💥 All 294,000+ unreviewed GitHub advisories are available now. Give it about 15 seconds or so to...

GitHub releases 294,000+ unreviewed security advisories as searchable dataset.

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Unit 42 reveals LLM guardrail fragility using genetic algorithm prompt fuzzing across open and closed models.

Our research introduces genetic algorithm-inspired prompt fuzzing. This method generates meaning-...

Researchers develop genetic algorithm-based prompt fuzzing to test LLM guardrail robustness.

Microsoft Xbox One Hacked - Schneier on Security

Researcher discloses voltage glitching exploit against Xbox One boot ROM.

New KB5085516 emergency update fixes Microsoft account sign-in

Microsoft releases emergency KB5085516 update to fix Microsoft account sign-in regression after March Patch Tuesday.

Signed #RMM and synthetic domains are exploited to bypass #cybersecurity. Tactic: Hijacking of a...
‼️A threat actor is advertising "Atroposia RAT," an advanced Remote Access Trojan built in C++/Ru...
CISA KEV Catalog
‼️🇨🇳 Partial Leak of Knownsec Corporate Documents Resurfaces With Espionage Tradecraft, Offensi...
‼️ Community Alert: Security researcher Ryan Moran has published a writeup on Session for Desktop...
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
‼️ Azury Infostealer Source Code Sold for $100 With Full Operator Panel, Crypto Wallet Theft, and...
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
Are We Ready for Auto Remediation With Agentic AI?
Unit42-timely-threat-intel/2026-03-09-Threat-Alert-30K-domains-distributing-malicious-AI-related-browser-extension.txt at main · PaloAltoNetworks/Unit42-timely-threat-intel