Ravie LakshmananMar 19, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. …
Data
Editor’s Note: Fisherpeople get it: It’s called fishing, not catching. And any fisher who says he/she has never been skunked, or come home empty-handed, has also never been fishing! But …
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw …
This course aims to equip individuals involved in malaria surveillance, program implementation, monitoring, and evaluation to analyse, interpret, and use routine malaria data for effective decision-making. What will you learn …
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters …
About the Webinar Post-distribution monitoring is often treated as a standalone survey that is completely disconnected from the original distribution data. This siloed approach makes it difficult to verify beneficiary …
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Dec 06, 2025Ravie LakshmananAI Security / Vulnerability Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate …
Rapid Gender Analysis – Secondary Data Review is a course in which you learn to conduct a Rapid Gender Analysis (RGA) working on your own context using existing data. It …
Government considered destroying its data hub after decade-long intrusion
Gavin Knapp, cyber threat intelligence lead at Bridewell, a supplier to the UK government critical network infrastructure, endorsed the severity of this approach. He said, “it’s like when a device is …
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within …