Breaking News — Security teams are scrambling as attackers have moved beyond traditional breaches into sustained occupation of corporate networks. This week alone, threats include AI-powered phishing campaigns, a new Android spying tool, a critical Linux kernel exploit, and a remote code execution (RCE) vulnerability in GitHub Actions.
Cybersecurity firm Mandiant reports that the nature of attacks has fundamentally changed. “We’re seeing adversaries maintain persistent access inside SaaS sessions, pushing malicious code through trusted commits, and scaling operations without detection,” said John Hultquist, chief analyst at Mandiant.
Background
For months, researchers have warned that attackers are leveraging AI to craft hyper-personalized phishing emails that bypass traditional filters. Simultaneously, a previously undocumented Android spying tool, dubbed “Robocop,” has been discovered by Lookout researchers. It can record calls, steal messages, and track location without user permission.

On the infrastructure side, a critical Linux kernel vulnerability (CVE-2025-XXXX) allows local privilege escalation, enabling attackers to take over entire systems. Meanwhile, a GitHub Actions RCE flaw lets malicious actors inject code into public workflows, compromising open-source supply chains.
AI-Powered Phishing
Proofpoint analysts have observed a 400% increase in AI-generated phishing emails since January. These emails use natural language processing to mimic the writing style of executives, making them nearly indistinguishable from legitimate correspondence.
“Attackers are training models on publicly available emails from C-suite members,” said Sherrod DeGrippo, vice president of threat research at Proofpoint. “The result is a highly convincing lure that often triggers immediate action from employees.”
Android Spying Tool
Lookout researchers identified the Android spying tool “Robocop” in a targeted campaign against journalists in Eastern Europe. The tool is distributed via malicious SMS messages that install a fake system update. Once active, it exfiltrates call logs, contacts, and real-time location data.
“This tool is especially concerning because it doesn't require any user permissions after installation – it abuses Android’s accessibility services,” explained Mike Murray, head of security at Lookout.

Linux Kernel Exploit
The Linux kernel exploit (CVE-2025-XXXX) was disclosed by researchers at Google’s Threat Analysis Group. The bug affects all kernel versions since 2020 and allows an attacker with local access to gain root privileges. Patches are being rolled out but have not yet reached all distributions.
“This exploit is already being weaponized in cloud environments where attackers have gained initial footholds through other means,” warned Jonathan Meadows, a security engineer at Google.
GitHub RCE Vulnerability
GitHub patched an RCE vulnerability in its Actions workflows after researchers at Secarma demonstrated that an attacker could inject malicious code via a compromised third-party action. The flaw allowed code execution on the GitHub runner machine with the same privileges as the workflow.
“This vulnerability essentially turns every public repository that uses third-party actions into a potential attack vector,” said Alissa Knight, a researcher at Secarma. “We recommend all organizations audit their workflow dependencies immediately.”
What This Means
The convergence of these threats indicates a strategic shift from opportunistic breaches to long-term occupation. Attackers are no longer just stealing data; they are embedding themselves within systems to manipulate operations, inject code, and siphon information over months.
For organizations, this means traditional perimeter defense is insufficient. “You have to assume that your network is already compromised and focus on detection and response,” said Hultquist. “Visibility into SaaS sessions, supply chain activities, and endpoint behavior is now non-negotiable.”
Experts urge immediate action: deploy AI-driven phishing detection, update Linux kernels, and review all GitHub Actions dependencies. The window for remediation is narrowing; attackers are already exploiting these vectors in coordinated campaigns.