New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts.
“The i… Continue reading New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

Posted in Uncategorized

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

An attacker could have planted a malicious configuration to execute commands outside the sandbox.
The post Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks appeared first on SecurityWeek.
Continue reading Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

Met Police face criticism for using AI to spy on their own officers

London police officers have been warned by the Metropolitan Police Federation to watch their backs after the force deployed controversial AI software to investigate misconduct. The staff association, representing more than 30,000 officers in London, re… Continue reading Met Police face criticism for using AI to spy on their own officers

Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)

Security researchers at Theori have disclosed a high-severity local privilege escalation (LPE) vulnerability (CVE-2026-31431) in the Linux kernel. The flaw, nicknamed “Copy Fail”, has affected virtually every major Linux distribution shippe… Continue reading Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)

Nearly half of UK businesses pwned last year as phishing keeps doing the job like it’s 2005

Turns out the real problem is not AI but staff still clicking on dodgy emails from ‘IT support’ Nearly half of UK businesses are still getting breached, and in many cases, the attacker’s big breakthrough is an employee clicking “sure, why not” on a fak… Continue reading Nearly half of UK businesses pwned last year as phishing keeps doing the job like it’s 2005

Posted in Uncategorized