Kuse Web App Abused to Host Phishing Document
Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack.
The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the most hostile cyber threat environment ever recorded.
Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack.
Our research on Void Dokkaebi’s operations uncovered a campaign that turns infected developer repositories into malware delivery channels. By spreading through trusted workflows, organisational codebases, and open-source projects, the threat can scale from a single compromise to a broader supply chain risk.
An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defences and amplify blast radius. This article examines the attack chain, underlying design trade-offs, and what it reveals about modern PaaS and software supply chain risk.
Europe’s energy sector underpins almost every aspect of modern society. Electricity generation, transmission, and distribution are not just economic functions but foundations of public safety, healthcare, transportation, and national stability.
Enterprises aiming to predict and mitigate human, machine, and AI‑agent risks at scale demand AI‑powered identity‑first security without compromise.
The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the most hostile cyber threat environment ever recorded.
Threat actors leveraged Anthropic’s Claude Code npm release packaging error to distribute Vidar, GhostSocks, and PureLog Stealer. This blog details immediate steps organisations can take and best practices to prevent further risk.
A packaging error in Anthropic’s Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponised the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.
TrendAI reviews the White House National Cyber Strategy, outlining six pillars to strengthen U.S. cybersecurity—from deterrence and regulation to federal modernisation, critical infrastructure protection, AI leadership, and workforce development.
This blog examines how AI‑driven vibecoding accelerates software development while increasing security risk by outpacing traditional review and ownership. It explains why security needs to move earlier and be integrated into modern development workflows.