Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

Researchers say a vulnerability in Perplexity’s Comet AI browser could expose local files and credentials through malicious calendar invites. The post Perplexity AI Browser Flaw...

Tycoon 2FA Phishing Kit Disrupted by Microsoft, Europol and Partners

Microsoft, Europol, and partners have dismantled the Tycoon 2FA phishing-as-a-service (PhaaS) platform, seizing 330 domains used for credential theft and MFA bypass. This coordinated...

Enhanced access denied error messages with policy ARNs

To help you troubleshoot access denied errors, we recently added the Amazon Resource Name (ARN) of the denying policy to access denied...

Coalition of Western Countries Launches 6G Cybersecurity Guidelines

A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards - Read more

Microsoft Azure Data Explorer Cross-Tenant Data Leak with Custom Dashboard

Microsoft Azure Data Explorer Cross-Tenant Data Leak with Custom Dashboard Tenable Research has identified and responsibly disclosed a critical cross-tenant data exfiltration vulnerability in...

Iranian hacktivists muster their forces but state APTs lay low

Hacktivist activity surrounding the Iran war is sky-high but Iran's state-backed cyber espionage actors have yet to show their hands, giving security teams a...

Mobile malware evolution in 2025

Starting from the third quarter of 2025, we have updated our statistical methodology based on the Kaspersky Security Network. These changes affect all sections...

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Key Findings During the ongoing conflict, we identified intensified targeting of IP cameras from two manufacturers starting on February 28, originating from infrastructure we...

The Iran War: What You Need to Know

Last updated on 4 March 2026 at 2000 GMT. Recorded Future's Insikt Group® is actively monitoring the rapidly evolving situation following coordinated US-Israeli...

Latest article

Security posture improvement in the AI era

It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other...

Metasploit Wrap-Up 05/01/2026

MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications...

Windows shell spoofing vulnerability puts sensitive data at risk

Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) have sounded the alarm about a Windows shell spoofing vulnerability...

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations...