Offensive Security

ue, 07 Apr 2026

AI-enabled device code phishing campaign exploits OAuth flow for account takeover

A phishing campaign abuses OAuth Device Code Authentication to bypass MFA and compromise accounts using AI-assisted automation.

Read Article

ue, 07 Apr 2026

GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack

Researchers from the University of Toronto discovered a new Rowhammer attack enabling privilege escalation via DRAM bit flips. This extends traditional Rowhammer vulnerabilities from CPUs to GPUs,...

Read Article

ue, 07 Apr 2026

Cybercriminals use fake Teams websites to install malware

Cybercriminals use fake websites that imitate Microsoft Teams to distribute malware. The scam starts with phishing via email or corporate channels.

Read Article

ue, 07 Apr 2026

The Hidden Cost of Recurring Credential Incidents

Credential security issues cause persistent disruptions beyond breach prevention. Recurring incidents burden IT and business operations daily.

Read Article