New research shows 3 flaws dubbed #ClaudyDay in Claude AI could be chained to steal user data using fake Google Ads, hidden prompts, and built-in features.
Read: https://hackread.com/claudy-day-flaws-data-theft-fake-claude-ai-ads/
#CyberSecurity #AI #ClaudeAI #InfoSec #DataSecurity #ThreatResearch #Malware #Privacy

“Claudy Day” Flaws Allow Data Theft via Fake Claude AI Ads, Report
Researchers detail “Claudy Day” flaws in Claude AI that could enable data theft using fake Google Ads, hidden prompts, and built-in features.
Hackread - Cybersecurity News, Data Breaches, AI and More
Technical Analysis of SnappyClient | ThreatLabz
SnappyClient is a C2 framework that features multiple evasion techniques that enable remote access and data theft.
New.
Kaspersky: The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico https://securelist.com/horabot-campaign/119033/ @Kaspersky #infosec #threatresearch

The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico
Kaspersky SOC uncovered and analyzed a complex Horabot campaign in Mexico. In this article we share insights into how it is unleashed and how to hunt for this threat.
Kaspersky
CursorJack: weaponizing Deeplinks to exploit Cursor IDE | Proofpoint US
Author’s Note: This post reflects Proofpoint Threat Research observations in a controlled test environment as of January 19, 2026. Proofpoint has no commercial, customer, partner, or vendor
Proofpoint
ROC STAR Report: February 2026
The Halcyon ROC STAR Report is a monthly threat intelligence publication from Halcyon's Ransomware Operations Center

Are AI security tools the new EDR? Attackers think so | Bitsight
AI security tools are becoming prime targets for attackers. Learn why governance, visibility, and cyber risk intelligence must evolve beyond reactive defense.
Bitsight
Free real estate: GoPix, the banking Trojan living off your memory
Kaspersky GReAT experts describe the unprecedentedly complex Brazilian banking Trojan GoPix that employs memory-only implants, Proxy AutoConfig (PAC) files for man-in-the-middle attacks, and malvertising via Google Ads.
KasperskyNew.
Cyble: AI-Assisted Phishing Campaign Exploits Browser Permissions to Capture Victim Data https://cyble.com/blog/ai-assisted-phishing-campaign/ #phishing #infosec #threatresearch #JavaScript

AI-Assisted Phishing Campaign harvesting Victim Data
Cyble analyzes an AI-driven phishing campaign that abuses browser permissions to capture victims images and exfiltrate the data to attacker-controlled Telegram bots.
Cyble"Over the past two weeks, Cisco has disclosed half a dozen new vulnerabilities in Catalyst SD-WAN Manager, half of which are now known to be exploited in the wild."
VulnCheck, posted yesterday: Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities https://www.vulncheck.com/blog/cisco-sd-wan-manager-vulns @vulncheck #infosec #vulnerability #threatresearch #Cisco

Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities | Blog | VulnCheck
VulnCheck’s Initial Access Intelligence team has been tracking and analyzing half a dozen recent vulnerabilities in Cisco Catalyst SD-WAN Manager, several of which have begun to see in-the-wild exploitation. Industry focus has been on CVE-2026-20127, but several other vulnerabilities also pose significant risk.
VulnCheckInitial access techniques used by Iran-based threat actors
Analysis of attacks originating from Iran-linked threat groups reveals a preference for certain techniques
SOPHOS