Cyber beyond humans: AI-Driven Phishing, Critical AI Flaws, and Identity Risks Uncovered

AI Models: The Next Frontier for Phishing
Cybercriminals may soon exploit AI models like LLMs to spread phishing scams, similar to SEO poisoning tactics. Discover how attackers manipulate AI-generated content to deceive users and what it means for cybersecurity. Learn more.
Critical RCE Flaw in Anthropic's MCP Exposes Developers
Discover a major vulnerability in Anthropic's Model Context Protocol allowing remote code execution, posing risks for AI developers. CVE-2025-49596 highlights the dangers of default settings in AI tools, urging immediate security updates. Read about the full vurnerability.
U.S. Cracks Down on N. Korean IT Schemes
Discover how the Justice Department's coordinated actions target North Korean IT operations exploiting U.S. companies to fund illicit programs. Learn about the arrests, indictments, and seizures that highlight the ongoing fight against cyber-enabled revenue schemes. Learn more.
Breaches to learn from

Cisco's Critical Flaw Exposed
Cisco's Unified CM flaw lets attackers in. Discover the urgent fix! Full article.

Qantas Data Breach Alert
6M customers' info exposed. Discover what's at stake. Full article.
What are we up to at Oasis

Git, History, and Hidden Mistakes: Why Deleting a Commit Isn't Enough
Think deleting a commit erases your secrets from Git history? Think again. Learn how Git’s structure, GitHub’s retention, and public archives make truly scrubbing sensitive data nearly impossible and discover how to respond effectively if it happens to you. Read more.

Managing Non-Human Identities During M&A: A Security Playbook
Mergers and acquisitions can expose hidden security risks through unmanaged non-human identities like service accounts and API keys. Discover a step-by-step playbook to identify, govern, and secure NHIs during M&A and see how Oasis Security empowers confident, compliant integration. Read more.
Catch up with us in person!

Black Hat USA 2025:
Innovate. Defend. Lead.
Stop by the Oasis booth #5216 and try our new site: Was I Leaked?. In seconds, you’ll see if your credentials have been exposed and what to do next. Grab some swag, and learn how Oasis helps you find, trace, and safely rotate leaked secrets before attackers can act. Read more about our presence here.
We do newsletters, too
Discover tips, technical guides and best practices in our biweekly newsletter.




