China’s National Computer Network Emergency Response Technical Team warned that the open-source AI agent OpenClaw has weak default security settings that attackers could exploit to gain system control. Attackers can use prompt injection, embedding malicious instructions in web pages to trick the AI into leaking sensitive data. Researchers showed that features like link previews in […]
Security researchers uncovered “Coruna,” a powerful iPhone exploit toolkit containing 23 exploits and five attack chains that can compromise devices. The toolkit can infect iPhones simply by visiting a malicious website, requiring little or no user interaction. Evidence suggests it was originally built for U.S. intelligence contractors, but the tools were leaked. After the leak, […]

