Network Security

ClawSec: Hardening OpenClaw Agents from the Inside Out

Autonomous agents are moving fast – from experimental side projects to real operational components inside development workflows and cloud environments. While agent capabilities are accelerating though, agent security itself has lagged behind. Most agent frameworks still assume implicit trust: There is trust in downloaded skills, prompts that evolve over time, and trust in agents not […]

ClawSec: Hardening OpenClaw Agents from the Inside Out Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 6

The Good | Former Google Engineer Steals AI Supercomputing Secrets for China Former Google software engineer Linwei Ding has been found guilty of economic espionage and trade secret theft after stealing sensitive AI supercomputing information and covertly sharing it with Chinese technology interests. Source: LinkedIn Ding was first indicted in March 2024 following an internal

The Good, the Bad and the Ugly in Cybersecurity – Week 6 Read More »

AI Security, From Data to Runtime: A Holistic Defense Approach

As organizations rush to adopt AI, they are discovering that traditional, siloed security tools cannot keep pace. The data is too vast, the infrastructure is too interconnected, and runtime environments are too dynamic. Security leaders are confronting a hard reality: AI cannot be secured with point solutions — it is just too broad. To scale

AI Security, From Data to Runtime: A Holistic Defense Approach Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good | U.S. Authorities Charge ATM Hackers, Dismantle Darkmarket, and Seize ‘RAMP’ Forum A U.S. federal grand jury has charged 31 defendants for their roles in an ATM jackpotting operation linked to Venezuela’s Tren de Aragua gang. The indictment details 32 counts tied to the use of Ploutus malware to drain ATMs nationwide. After

The Good, the Bad and the Ugly in Cybersecurity – Week 5 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 4

The Good | Authorities Expose RaaS Leaders, Prosecute Identity Hackers & Tighten EU Cybersecurity Rules Law enforcement in Ukraine and Germany have moved to dismantle Black Basta ransomware gang, confirming its leader and placing him on Europol and Interpol wanted lists. Identified as Oleg Evgenievich Nefedov, the Russian national is also known online as kurva,

The Good, the Bad and the Ugly in Cybersecurity – Week 4 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 3

The Good | Authorities Arrest 34 in Black Axe Cyber Fraud Crackdown Spanish police have arrested 34 suspects tied to a cyber fraud network allegedly linked to the Black Axe group, following a joint operation with Europol. After raids across four cities, authorities seized €66,400 in cash, vehicles, devices, and froze €119,350 held in bank

The Good, the Bad and the Ugly in Cybersecurity – Week 3 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 2

The Good | U.K. Government Resets Public-Sector Cybersecurity With £210M Action Plan The United Kingdom has unveiled a sweeping reset of its public-sector cybersecurity strategy, committing more than £210 million ($283 million) to shore up defenses across government departments and essential services. This investment is part of the new Government Cyber Action Plan, which marks

The Good, the Bad and the Ugly in Cybersecurity – Week 2 Read More »

12 Months of Fighting Cybercrime & Defending Enterprises | The SentinelLABS 2025 Review

Over the past twelve months, SentinelLABS research revealed how threat actors have changed their operational approach in ways previously unseen. Among our many research publications during 2025, we exposed North Korean threat actors monitoring the same cyber threat intelligence platforms defenders use to share indicators of compromise, and revealed how a single cryptocurrency phishing operation

12 Months of Fighting Cybercrime & Defending Enterprises | The SentinelLABS 2025 Review Read More »

When Your AI Coding Plugin Starts Picking Your Dependencies: Marketplace Skills and Dependency Hijack in Claude Code

AI coding assistants are no longer just autocompleting lines of code, they are quietly making decisions for you. Tools like Claude Code are able to read projects, plan multi-step changes, install dependencies, and modify files with minimal human oversight. To make this possible, these assistants rely on plugin marketplaces, where third-party developers can enable ‘skills’

When Your AI Coding Plugin Starts Picking Your Dependencies: Marketplace Skills and Dependency Hijack in Claude Code Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 1

The Good | Authorities Crackdown on BlackCat and Coinbase Malicious Insiders & Malware Operators Two former employees from Sygnia and DigitalMint have pleaded guilty for participating in ransomware attacks linking them to the BlackCat (ALPHV, AlphaVM) operation. Ryan Goldberg and Kevin Martin admitted to conspiring to extort U.S. organizations, abusing the same security expertise they

The Good, the Bad and the Ugly in Cybersecurity – Week 1 Read More »