When more than $100 billion in digital assets rely on smart contracts, security isn’t abstract. It’s immediate. A single overlooked bug can move markets, freeze funds, or drain liquidity in minutes. That’s the backdrop against which EVMbench arrives. EVMbench is a newly released AI blockchain security benchmark designed to evaluate how well AI systems handle AI smart contract security challenges including smart contract vulnerability detection, patch validation, and full exploit execution. Built by OpenAI in collaboration with Paradigm, the benchmark doesn’t just measure coding ability. It tests whether AI can operate responsibly inside environments where mistakes carry real financial consequences.And…
Author: V Diwahar
For many IT teams, backup systems are the quiet workhorses of the environment. They sit in the background, replicating virtual machines and preparing for worst-case scenarios that hopefully never arrive. But over the past 18 months, one of those trusted systems became a silent entry point.A critical Dell RecoverPoint zero-day vulnerability, tracked as CVE-2026-22769, has been exploited by a China-linked threat group since at least mid-2024.The flaw allowed attackers to authenticate using hardcoded credentials and gain full root-level control over affected appliances. From there, they deployed custom malware, established long-term persistence, and pivoted deeper into VMware infrastructure.The affected product, Dell…
CVE-2026-1731 has quickly become one of the most urgent enterprise vulnerabilities of 2026. The flaw affects BeyondTrust Remote Support (RS) and BeyondTrust Privileged Remote Access (PRA) appliances and carries a CVSS v4 score of 9.9 about as severe as it gets. Disclosed on February 6, 2026, and added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog just a week later, CVE-2026-1731 is not theoretical. It’s being exploited in the wild. And because it’s a pre-authentication remote code execution vulnerability, attackers don’t need credentials, MFA tokens, or user interaction to gain a foothold.For organizations that…
The UK Cyber Essentials campaign, launched on February 16, 2026, carries a message that feels both simple and urgent: if you wouldn’t leave your office unlocked overnight, don’t leave your business exposed online. Led by the UK Government, the campaign focuses on helping small and medium-sized businesses (SMEs) take practical, affordable steps to protect themselves from cyber criminals. It avoids technical overwhelm and instead promotes straightforward security habits that dramatically reduce risk. The timing matters. Cyber crime is costing UK businesses an estimated £14.7 billion annually. Half of small businesses experienced a breach or attack in the past 12 months.…
India has issued a high-level AI Impact Summit cybersecurity alert ahead of the landmark global gathering, warning that foreign threat actors may attempt to deploy deepfakes, hijack networks, plant malware, and launch ransomware attacks targeting critical infrastructure. This isn’t just routine caution. The summit will bring together world leaders, AI researchers, policymakers, and global technology stakeholders. That kind of visibility makes it a magnet for cybercriminals and state-sponsored groups looking to disrupt, embarrass, or manipulate.Officials are particularly concerned about attempts to alter speeches using deepfake technology, compromise ISP routers, and disrupt live video conferencing systems during high-profile sessions.Why does this…
The Claude artifacts ClickFix macOS infostealer campaign marks a troubling evolution in search-based malware attacks. Threat actors are now abusing public AI-generated content to trick macOS users into infecting themselves simply by copying and pasting commands into Terminal. Researchers from MacPaw’s Moonlock Lab and AdGuard have uncovered multiple malicious campaigns that leverage public artifacts hosted on Anthropic’s Claude platform. These fake guides appear in Google Search results for common macOS queries such as “Homebrew install,” “online DNS resolver,” and “macOS disk space analyzer.” At least 15,000 users reportedly viewed one of these malicious guides before it was flagged. The true…