Review this: Prompt injection turned MCP-connected code assistants into…

AI security

Research areas

threat · research

Threat Research

Malware analysis, campaign tracking, vulnerability write-ups

engineering

Engineering

Building tools, queries, automation and infrastructure

ai · agents

AI & Agents

Agentic AI, security implications, tooling

Intelligence

Threat Feed

View all →
informationalpolicy

Dell and HP Advance Post-Quantum Cryptography in Consumer Hardware as NIST Standards Mature

Dell and HP have announced quantum-resistant security features integrated into their PC and printer products ahead of NIST's finalised post-quantum cryptography standards. This represents early industry adoption to address the theoretical but long-term threat of cryptanalytically relevant quantum computers.

highmalware

RedLine Infostealer Administrator Arrested: Law Enforcement Disrupts Malware-as-a-Service Operation

Hambardzum Minasyan, an Armenian national allegedly involved in developing and administering the RedLine infostealer, has been extradited to the United States. This arrest represents a significant enforcement action against a malware-as-a-service operation that has compromised thousands of organisations globally.

highmalware

WebRTC Data Channels Enable CSP-Agnostic Payment Skimming on E-Commerce Platforms

Attackers are deploying payment skimmers that abuse WebRTC data channels to receive malicious payloads and exfiltrate stolen card data, successfully circumventing Content Security Policy controls that block traditional HTTP-based exfiltration vectors.

criticalvulnerability

Trivy Supply Chain Compromise via Credential Theft - Multi-Repository Malware Injection

Threat actors used compromised credentials to inject malware into Trivy releases and related GitHub Actions repositories, affecting users of v0.69.4-0.69.6 and action workflows. This demonstrates a critical supply chain attack vector targeting security tooling infrastructure.

Research

Latest Research

View all →