How attackers blend legacy botnets, cloud abuse, and AI assistance for maximum impact

Weekly insights on threats, vulnerabilities, and security best practices.

Threat actors weaponize OAuth 2.0 Device Authorization flow with vishing campaigns to compromise Microsoft Entra accounts across technology, manufacturing, and financial sectors.

CRESCENTHARVEST campaign deploys custom RAT malware against Iran protest supporters, demonstrating advanced surveillance TTPs for long-term information theft and monitoring operations.

CVE-2026-2329 stack-based buffer overflow in Grandstream GXP1600 VoIP phones allows unauthenticated remote code execution with CVSS 9.3 scoring, enabling network pivoting.