Anthropic’s Claude Plugins: Turning AI into Departmental Power Tools

Anthropic’s latest update to Claude is less about a single chatbot and more about turning generative AI into a set of specialized assistants that live inside everyday enterprise workflows. The company has released a suite of job-specific plugins and a management layer that lets organizations tailor Claude into role-focused agents for HR, finance, research and other functions. Coupled with deeper

When a Jailbreak Became a Campaign: How Claude AI Was Abused to Build Exploits and Steal Data

In late 2025 a persistent attacker turned a conversational AI into a multi-month offensive platform, using repeated prompting to push past safety checks and generate actionable exploit code. The incident — uncovered by a security firm and reported in mainstream sources — illustrates a worrying new vector in which AI models can be manipulated into performing the research, coding, and

When Kali Meets Claude: How AI and MCP Are Changing Penetration Testing

The tools and workflows of penetration testing have evolved steadily over the past decade, but a recent shift feels more like a paradigm change than an incremental upgrade. Kali Linux — the distribution many security professionals rely on for reconnaissance, scanning, and exploitation — has been connected to a large language model via the open Model Context Protocol (MCP). The

OpenClaw 2026.2.23 — Security-First Upgrade Meets Expanded Multi‑Model AI Support

OpenClaw’s 2026.2.23 release is one of those updates that signals the project maturing from a fast-moving, feature-first AI assistant into a hardened platform ready for production gateways and privacy-conscious deployments. Tagged by steipete and contributed to by dozens of maintainers, this version balances pragmatic security hardening with meaningful AI improvements: support for Claude Opus 4.6 via the Kilo gateway, improved

Urgent Patching Required: Multiple VMware Aria Vulnerabilities Enable Remote Code Execution and Privilege Escalation

VMware’s Aria Operations — a cornerstone for many organizations’ cloud and infrastructure management — was thrust into the spotlight this week after Broadcom published VMSA-2026-0001, detailing three significant vulnerabilities. These flaws range from command injection that can lead to full remote code execution, to stored cross-site scripting that enables administrative actions, and a privilege escalation path from vCenter to Aria