CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

February 28, 2026 No Comments

OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence

Read More »

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

February 28, 2026 No Comments

New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini

Read More »

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

February 28, 2026 No Comments

Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply

Read More »

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

February 27, 2026 No Comments

The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes

Read More »

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

February 27, 2026 No Comments

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command

Read More »

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

February 27, 2026 No Comments

Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor

Read More »
Load More