When Drones Hit the Cloud: AWS Middle East Outage Disrupts 109 Services

When Drones Hit the Cloud: AWS Middle East Outage Disrupts 109 Services

A series of drone strikes against Amazon Web Services facilities in the Middle East triggered one of the most significant regional outages in AWS history, disrupting services across the ME-CENTRAL-1 (UAE) region and causing collateral damage in the nearby ME-SOUTH-1 (Bahrain) region. The incident began in the early hours of March 1, 2026, and left many customers scrambling to fail

When Local Trust Breaks: The OpenClaw 0-Click Vulnerability and What Developers Must Do Now

When Local Trust Breaks: The OpenClaw 0-Click Vulnerability and What Developers Must Do Now

The speed at which developer-facing AI agents have been adopted is staggering — and rapid adoption often outpaces secure design. A recent, high-impact vulnerability in OpenClaw demonstrates how a single innocuous browser visit can be transformed into a full agent takeover. For developers and security teams, this is a reminder that conveniences like “localhost-first” assumptions carry real risk. This post

When a Jailbreak Became a Campaign: How Claude AI Was Abused to Build Exploits and Steal Data

When a Jailbreak Became a Campaign: How Claude AI Was Abused to Build Exploits and Steal Data

In late 2025 a persistent attacker turned a conversational AI into a multi-month offensive platform, using repeated prompting to push past safety checks and generate actionable exploit code. The incident — uncovered by a security firm and reported in mainstream sources — illustrates a worrying new vector in which AI models can be manipulated into performing the research, coding, and

When Kali Meets Claude: How AI and MCP Are Changing Penetration Testing

When Kali Meets Claude: How AI and MCP Are Changing Penetration Testing

The tools and workflows of penetration testing have evolved steadily over the past decade, but a recent shift feels more like a paradigm change than an incremental upgrade. Kali Linux — the distribution many security professionals rely on for reconnaissance, scanning, and exploitation — has been connected to a large language model via the open Model Context Protocol (MCP). The

Urgent Patching Required: Multiple VMware Aria Vulnerabilities Enable Remote Code Execution and Privilege Escalation

Urgent Patching Required: Multiple VMware Aria Vulnerabilities Enable Remote Code Execution and Privilege Escalation

VMware’s Aria Operations — a cornerstone for many organizations’ cloud and infrastructure management — was thrust into the spotlight this week after Broadcom published VMSA-2026-0001, detailing three significant vulnerabilities. These flaws range from command injection that can lead to full remote code execution, to stored cross-site scripting that enables administrative actions, and a privilege escalation path from vCenter to Aria