
"This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from. From shifting infrastructures to clever social hooks, the week's activity shows just how fluid the threat landscape has become. Here's the full rundown of what moved in the cyber world this week."
""While Anthropic authored the MCP specification, it's not their job to enforce how every server handles authorization," Bitsight said. "Because authorization is optional, it's easy to skip it when moving from a demo to a real-world deployment, potentially exposing sensitive tools or data. Many MCP servers are designed for local use, but once one is exposed over HTTP, the attack surface expands dramatically.""
Attackers are reshaping old tools and finding new angles in familiar systems, with small tactical shifts compounding quickly. Roughly 1,000 Model Context Protocol (MCP) servers were found exposed with no authorization, risking Kubernetes management, CRM access, WhatsApp messaging, and remote code execution. Authorization for MCP is optional, increasing the likelihood of insecure deployments; avoiding public exposure and implementing OAuth protections are essential mitigations. An exposure scan of about 5 million single-page applications revealed over 42,000 tokens across 334 secret types. India’s CBI disrupted an SMS phishing ring linked to fake arrests, loan and investment scams, with three arrests reported.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]