Cyber Accord
  • Home
  • Services
    • Security Testing
    • CLOUD SECURITY
    • GAP ASSESSMENTS
    • Compliance Readiness
    • Advisory
    • Questionnaires
  • About us
  • Contact
  • Our Blogs
Select Page
ai-agents – 28 Claude Code Subagents for Penetration Testing

ai-agents – 28 Claude Code Subagents for Penetration Testing

Cyber Security

A new open-source toolkit called pentest-ai-agents is redefining how security professionals leverage AI in penetration testing workflows, transforming Anthropic’s Claude Code into a fully specialized offensive security research assistant powered by 28 domain-specific...
73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

Cyber Security

The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This...
ADT Confirms Data Breach Following ShinyHunters Data Leak Claim

ADT Confirms Data Breach Following ShinyHunters Data Leak Claim

Cyber Security

Home security giant ADT Inc. has confirmed a data breach after the notorious threat group ShinyHunters claimed to have stolen over 10 million records and issued a ransom ultimatum — “Pay or Leak.” ADT, headquartered in Boca Raton, Florida, disclosed the incident via a...
Hackers Abuse SS7 and Diameter Protocols to Track Mobile Users Worldwide

Hackers Abuse SS7 and Diameter Protocols to Track Mobile Users Worldwide

Cyber Security

A major investigation has revealed that sophisticated threat actors are exploiting fundamental vulnerabilities in global mobile networks to track users worldwide. By abusing legacy 3G SS7 and 4G Diameter signaling protocols, hackers are successfully bypassing telecom...
Apple Fixes Notification Privacy Flaw That Allowed FBI to Access Deleted Signal Messages

Apple Fixes Notification Privacy Flaw That Allowed FBI to Access Deleted Signal Messages

Cyber Security

Apple released iOS 26.4.2 and iPadOS 26.4.2 on April 22, 2026, to patch a critical notification privacy vulnerability that allowed law enforcement to extract Signal message content from iPhones — even after the app had been deleted. The flaw, tracked as...
« Older Entries
Next Entries »

Recent Posts

  • Attackers Abuse Google AppSheet, Netlify, and Telegram in Facebook Phishing Campaign
  • Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets
  • Cursor AI Extension Access Developer Tokens Leads to Full Credential Compromise
  • BlobPhish Attack Steals Microsoft 365 Credentials
  • Fake Document Reader On Google Play With 10K Downloads Installing Anatsa Malware

Categories

  • Cyber Security
CyberAccord | All Rights Reserved | 2025