Dataflow Rider: How Attackers can Abuse Shadow Resources in Google Cloud Dataflow

Varonis Threat Labs disclosed “Dataflow Rider,” a technique that lets attackers with basic write access to Google Cloud Storage buckets replace Cloud Dataflow templates or Python UDFs to hijack pipelines and execute arbitrary code on worker nodes. The attack can enable data exfiltration, credential theft (service‑account tokens), data manipulation, and lateral…

Read More
Leaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructure

China appears to have used a secret cyber range called Expedition Cloud to rehearse attacks on replicas of neighboring countries’ critical infrastructure, according to a cache of leaked development and training files. The materials, linked to developer files from CyberPeace and obtained via an exposed FTP server, show staged reconnaissance and…

Read More

Farcaster, a decentralized social network protocol developed by Merkle Manufactory, has allegedly been compromised in a leak labeled “Farcaster Wallet.” A 1.3 GB JSON dataset containing FIDs, usernames, profile bios, location data, profile picture URLs, connected X/Twitter handles, and Ethereum and Solana wallet addresses and labels was dumped to a file-sharing…

Read More
New tool blocks imposter attacks disguised as safe commands

Tirith is a new open-source, cross-platform tool that detects and blocks homoglyph and other deceptive attacks in command-line environments by analyzing URLs in pasted or typed commands and preventing their execution. It hooks into shells like zsh, bash, fish, and PowerShell to inspect commands locally with sub-millisecond overhead, offering byte-level Unicode inspection and offline auditing without sending telemetry. #Tirith #PowerShell

Read More
OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

OpenClaw has partnered with VirusTotal to scan every skill uploaded to the ClawHub marketplace using SHA-256 hashing and VirusTotal Code Insight, automatically approving benign skills, flagging suspicious ones, and blocking malicious downloads while re-scanning active skills daily. Researchers and vendors warn the measure is not a silver bullet amid widespread misconfigurations,…

Read More
Automating GOAD and Live Malware Labs

This blog describes an automated, scalable cyber-range that uses Ludus to deploy multi-VM labs (GOAD and XZbot) and instruments every host with Elastic Agent/Defend to validate detections against real attacks. It details safe isolation techniques for running a live CVE-2024-3094 backdoor, shows how Elastic SIEM/XDR (Event Analyzer, Session Viewer) surfaces forensic “smoking guns,” and explains AI-driven hunting and response with Attack Discovery, the AI Assistant, and Elastic Workflows. #GOAD #XZbot

Read More
In Other News: Record DDoS, Epstein’s Hacker, ESET Product Vulnerabilities

This roundup condenses notable cybersecurity developments that include espionage, large-scale DDoS activity, AI-driven intrusions, vulnerability disclosures, and consumer data breaches. This week’s highlights include the conviction of former Google engineer Linwei Ding for stealing AI trade secrets, Cloudflare reporting a record 31.4 Tbps DDoS attack, an LLM-assisted AWS admin takeover observed…

Read More
Living off the AI: The Next Evolution of Attacker Tradecraft

Attackers are evolving from “living off the land” and “living off the cloud” to “living off the AI,” abusing AI agents, MCP connectors, prompts, and shared vector stores to exfiltrate data, execute actions, and deploy malware through legitimate workflows. Defenders must treat agents as privileged users—apply least privilege, harden prompts and…

Read More
Black Basta: Defense Evasion Capability Embedded in Ransomware Payload

Black Basta operators (tracked as the group Cardinal) deployed a ransomware payload that uniquely bundled a vulnerable NsecSoft NSecKrnl kernel driver (CVE-2025-68947) to kill security processes and evade defenses, appending a “.locked” extension to encrypted files. The campaign also included a prior side-loaded loader and post-deployment presence of the GotoHTTP RAT, suggesting long dwell time or attempts to maintain persistence. #BlackBasta #Cardinal

Read More
Microsoft to shut down Exchange Online EWS in April 2027

Microsoft announced that Exchange Web Services (EWS) for Exchange Online will be shut down on April 1, 2027, with default blocking beginning October 1, 2026 and no exceptions after the final cutoff. Administrators can temporarily preserve access by configuring application allowlists by the end of August 2026, Microsoft will pre-populate allowlists in September 2026 for tenants that do not create their own, may run temporary “scream tests” to expose hidden dependencies, and recommends migrating apps to the Microsoft Graph API. #ExchangeWebServices #MicrosoftGraph

Read More
Substack Discloses Security Incident After Hacker Leaks Data

Substack disclosed a security incident after a hacker leaked user records allegedly taken from its systems, exposing email addresses, phone numbers, and internal metadata. The company says passwords and payment information were not exposed, notified users after discovering the October 2025 incident on February 3, and urged vigilance for suspicious messages….

Read More
Technical Analysis of Marco Stealer

Zscaler ThreatLabz discovered Marco Stealer in June 2025, an information stealer that primarily exfiltrates browser data, cryptocurrency wallet data from extensions, and sensitive files from local and cloud storage. The malware uses ARX-based runtime string decryption, anti-analysis checks that terminate tools like x64dbg and Wireshark, named pipes and DLL injection to extract browser and wallet data, and sends AES-256–encrypted data to HTTP C2 endpoints. #MarcoStealer #Zscaler

Read More
Nullify Secures .5 Million in Seed Funding for Cybersecurity AI Workforce

Nullify raised $12.5 million in a seed round led by SYN Ventures, bringing total funding to $16.9 million to scale go-to-market, engineering and research teams, and expand internationally. Nullify’s AI-based autonomous workforce for vulnerability management integrates with codebases, cloud environments, ticketing systems and a long-term memory called Vault to detect, triage,…

Read More