Anthropic ‘made a mistake’ in Pentagon talks and should ‘correct course,’ FCC boss says

FCC Chairman Brendan Carr testifies before the House Appropriations Subcommittee on Financial Services and General Government at the Rayburn House Office Building on May 21, 2025 in Washington, DC. John Mcdonnell | Getty Images Anthropic “made a mistake” in its dealings with the Department of Defense, Federal Communications Commission Chairman Brendan Carr told CNBC on […]

Continue Reading

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Ravie LakshmananMar 03, 2026Vulnerability / Artificial Intelligence The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that […]

Continue Reading

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Ravie LakshmananMar 03, 2026Phishing / Malware Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their […]

Continue Reading

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand’s real […]

Continue Reading

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Ravie LakshmananMar 03, 2026Vulnerability / Mobile Security Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component. “Memory corruption when adding user-supplied data without checking […]

Continue Reading

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

Ravie LakshmananMar 03, 2026Malware / Phishing The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains […]

Continue Reading