Category: Security

Screens display coding text, representing programming work.
Security

Control the backend: ACE shuts down AnimePlay’s APK by seizing 29 GitHub repos and hosting in Riau

ACE (the Alliance for Creativity and Entertainment) has dismantled AnimePlay — an Android APK-based piracy app run from Riau, Indonesia — by seizing its entire backend: 29 GitHub repositories with source code, servers, databases, advertising tools, 15 domains and the hosting environment. AnimePlay had operated since 2020, amassed more than 5 million registered users and […]

admin 
Empty blue stadium seats with yellow accents
Security

Ajax breach warns clubs: shared digital key in ticketing app let attackers reassign tickets and lift stadium bans

Ajax Amsterdam’s early-2026 breach exposed a systemic flaw in its ticketing app: a shared digital key allowed mass unauthorized access to personal data and, crucially, to operational controls — reassigning more than 42,000 season tickets and flipping over 538 active stadium bans were all possible, not just isolated data reads. Who this matters for now: […]

admin 
man in white crew neck t-shirt sitting on brown chair
Security

GitHub’s CodeQL + AI detections: wider coverage and faster fixes — at the cost of continued human review

GitHub is rolling AI-powered security detections into the same workflow where developers review code, pairing those models with CodeQL static analysis to extend coverage into Shell/Bash, Dockerfiles, Terraform, PHP and other gaps in traditional scanning. The payoff is broader, earlier detection and faster remediation; the trade-off is additional governance and human review to catch AI […]

admin 
A man sitting on a train using a laptop computer
Security

CVE-2026-4681: Indicators of active attacks on PTC Windchill and FlexPLM — who must act now

CVE-2026-4681 is a critical remote-code-execution flaw in PTC Windchill PDMLink and FlexPLM tied to unsafe deserialization; independent detections show Indicators of Compromise (IOCs) consistent with active exploitation attempts, so organizations running affected versions should treat this as an incident in progress rather than a purely theoretical risk. Which deployments are at highest immediate risk The […]

admin 
A neon sign is lit up on the side of a building
Security

Varonis launches Atlas: shifts AI security from discovery to inline runtime protection — next test is enterprise-scale adoption

Varonis Systems has launched Varonis Atlas, an end-to-end AI security platform that combines continuous AI asset discovery, runtime protection, threat detection, and governance with the company’s data-sensitivity context. The product is pitched as more than a discovery or monitoring tool: Atlas aims to close blind spots from shadow AI through to live model interactions and […]

admin 
a skeleton sitting at a desk with a laptop and keyboard
Security

When Chrome briefly exposes its master key: VoidStealer v2.0 uses debugger hardware breakpoints to extract it

VoidStealer v2.0 demonstrates a concrete condition under which Chrome’s Application-Bound Encryption (ABE) can be bypassed: if the browser places the v20_master_key into user-mode registers during decryption, a debugger that sets hardware breakpoints can capture that key without SYSTEM privileges or code injection. How VoidStealer v2.0 captures the master key during Chrome startup The attack starts […]

admin 
A bearded man reviews documents at a desk with a laptop in a modern office setting.
Security

Weaponizing management vs. malware: Stryker’s Intune wipe shows stolen admin credentials are deadlier than new exploits

On March 11, 2026, an Iran-linked group calling itself Handala used compromised Microsoft Entra ID and Intune administrative access to remotely wipe more than 200,000 devices in 79 countries. The incident demonstrates a specific danger: legitimate MDM capabilities can be weaponized through stolen admin credentials, producing destruction without any endpoint malware. How a single admin […]

admin 
The inside of a submarine is shown.
Security

Late 2024: OpenAI cleared for classified Pentagon use — AI-assisted targeting and drone defenses reach the Iran theater

OpenAI’s recent agreement to allow its models inside classified Pentagon systems has already shifted the battlefield calculus: its conversational AI is slated to assist human analysts with targeting and integrate with drone‑defense platforms, a move linked to operations around Iran and raising concrete oversight questions. Authorization, deployments, and the Iran connection The Pentagon’s decision to […]

admin