Microsoft Links Medusa Ransomware Affiliate to Zero-Day Exploitation Campaign

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Exploitation Campaign

Microsoft’s recent analysis tying a Medusa ransomware affiliate to a campaign that leveraged zero-day vulnerabilities has put a renewed spotlight on the evolving tactics of extortion groups and the threat posed by previously unknown software flaws. For security teams and executives, the announcement is a reminder that threat actors are combining rapid vulnerability exploitation with tried-and-true ransomware playbooks to increase

Anthropic’s Claude Leak: 8,000 Takedown Requests After an Accidental Source-Code Exposure

Anthropic’s Claude Leak: 8,000 Takedown Requests After an Accidental Source-Code Exposure

Anthropic has scrambled to contain the fallout after an accidental exposure of the complete source code for its Claude family of AI tools. The company issued roughly 8,000 copyright takedown requests to remove copies and adaptations circulating on code-hosting sites and mirrors, responding to a wave of reposts and forks that appeared within hours of the initial disclosure. Although Anthropic

PNG parsing flaws in libpng let attackers crash processes, leak data, and risk code execution

PNG parsing flaws in libpng let attackers crash processes, leak data, and risk code execution

Two high-severity vulnerabilities discovered in libpng—the widely used reference library for reading and writing PNG images—create a sweeping risk for any software that parses images. The flaws can trigger process crashes, leak sensitive heap contents, and, on some platforms, enable arbitrary code execution. Because image handling is baked into web applications, server-side processing pipelines, mobile and embedded systems, and desktop

Hackers Weaponize Legitimate Windows Tools to Kill Antivirus — What Defenders Must Do Now

Hackers Weaponize Legitimate Windows Tools to Kill Antivirus — What Defenders Must Do Now

Ransomware gangs have evolved from noisy mass campaigns into precise, surgical operators. A growing and dangerous trend is the abuse of legitimate Windows utilities — tools built to help administrators troubleshoot and repair systems — as the first step in modern ransomware operations. By repurposing utilities such as Process Hacker, IOBit Unlocker, PowerRun, AuKill and TDSSKiller, attackers can silently neutralize