March 11-14, 2026 | Dehradun, India | Training, Hackathon, and Conference

Weekly insights on threats, vulnerabilities, and security best practices.

Threat actors weaponize legitimate AI Model Context Protocol servers to distribute StealC infostealer. Critical supply chain attack vector targeting AI integration platforms.

Threat actors weaponize OAuth 2.0 Device Authorization flow with vishing campaigns to compromise Microsoft Entra accounts across technology, manufacturing, and financial sectors.

CISA adds four actively exploited vulnerabilities to KEV catalog, including Chrome CVE-2026-2441 use-after-free flaw. Analysis of attack vectors and defensive strategies for security teams.