When Kali Meets Claude: How AI and MCP Are Changing Penetration Testing

When Kali Meets Claude: How AI and MCP Are Changing Penetration Testing

The tools and workflows of penetration testing have evolved steadily over the past decade, but a recent shift feels more like a paradigm change than an incremental upgrade. Kali Linux — the distribution many security professionals rely on for reconnaissance, scanning, and exploitation — has been connected to a large language model via the open Model Context Protocol (MCP). The

OpenClaw 2026.2.23 — Security-First Upgrade Meets Expanded Multi‑Model AI Support

OpenClaw 2026.2.23 — Security-First Upgrade Meets Expanded Multi‑Model AI Support

OpenClaw’s 2026.2.23 release is one of those updates that signals the project maturing from a fast-moving, feature-first AI assistant into a hardened platform ready for production gateways and privacy-conscious deployments. Tagged by steipete and contributed to by dozens of maintainers, this version balances pragmatic security hardening with meaningful AI improvements: support for Claude Opus 4.6 via the Kilo gateway, improved

Urgent Patching Required: Multiple VMware Aria Vulnerabilities Enable Remote Code Execution and Privilege Escalation

Urgent Patching Required: Multiple VMware Aria Vulnerabilities Enable Remote Code Execution and Privilege Escalation

VMware’s Aria Operations — a cornerstone for many organizations’ cloud and infrastructure management — was thrust into the spotlight this week after Broadcom published VMSA-2026-0001, detailing three significant vulnerabilities. These flaws range from command injection that can lead to full remote code execution, to stored cross-site scripting that enables administrative actions, and a privilege escalation path from vCenter to Aria

SYSTEM at Risk: How a Splunk DLL Search-Order Flaw Lets Local Users Escalate Privileges

SYSTEM at Risk: How a Splunk DLL Search-Order Flaw Lets Local Users Escalate Privileges

Splunk is a cornerstone of many security and operations teams, trusted to ingest, index, and analyze machine data across the enterprise. That trust makes any vulnerability in Splunk especially consequential. In February 2026 Splunk disclosed a high-severity Windows-specific vulnerability (CVE-2026-20140) that allows a low-privileged local user to perform a DLL search-order hijacking attack and gain SYSTEM-level privileges. The mechanics are

Guardian of the Red Team: How Guardian Orchestrates Gemini, GPT-4 and 19 Top Security Tools for Smarter Pentesting

Guardian of the Red Team: How Guardian Orchestrates Gemini, GPT-4 and 19 Top Security Tools for Smarter Pentesting

Guardian is an open-source, AI-driven penetration testing framework that leverages multiple large language models to automate intelligent, evidence-backed security assessments. Designed for enterprise use, it combines a multi-agent architecture with a broad toolset to accelerate reconnaissance, triage, and reporting while preserving human oversight. What is Guardian? Guardian is an AI-powered penetration testing automation framework developed by Zakir Kun and available

Chrome 0‑Day Under Active Attack: CVE‑2026‑2441 — What You Need to Do Now

Chrome 0‑Day Under Active Attack: CVE‑2026‑2441 — What You Need to Do Now

Google has released an emergency patch for a high‑severity zero‑day in Chrome after confirming active exploitation in the wild. Tracked as CVE‑2026‑2441, the vulnerability is a use‑after‑free bug in Chrome’s CSS handling that can enable remote code execution when a user visits crafted web content. How the flaw works CVE‑2026‑2441 arises from improper lifecycle management of objects in the rendering