Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensur…
3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that… Endpoint Security Threat Intelligence
2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical… Network Security Vulnerability
2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to… Server Security Vulnerability
Malware Mobile Security3 Min Read February 19, 2026 PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial…
Cybercrime Financial Crime2 Min Read February 19, 2026 INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort…
Network Security Vulnerability1 Min Read February 19, 2026 Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows…
Cybersecurity Hacking News15 Min Read February 19, 2026 ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up…
Artificial Intelligence DevSecOps4 Min Read February 19, 2026 From Exposure to Exploitation: How AI Collapses Your Response Window We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving.…
Banking Malware Mobile Security3 Min Read February 19, 2026 Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that's designed to facilitate device takeover (DTO)…
Cyber Espionage Data Security4 Min Read February 19, 2026 CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing…
Cloud Security Ransomware Vulnerabilities2 Min Read February 19, 2026 Kubernetes project issues warning on Ingress NGINX retirement The title of the recent Kubernetes blog post "Ingress NGINX: Statement from the Kubernetes Steering and Security Response Committees" might…
Software Security Vulnerability2 Min Read February 18, 2026 Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions…
Data Security Zero Trust7 Min Read February 18, 2026 Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted…
Vulnerability Zero-Day4 Min Read February 18, 2026 Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024 A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected…
Enterprise Security Workflow Automation3 Min Read February 18, 2026 3 Ways to Start Your Intelligent Workflow Program Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full…
Artificial Intelligence Infostealer3 Min Read February 17, 2026 SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model…
Cloud Security Digital Forensics2 Min Read February 17, 2026 Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk…
Network Security Threat Detection9 Min Read February 17, 2026 My Day Getting My Hands Dirty with an NDR System My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could…
Artificial Intelligence Enterprise Security3 Min Read February 17, 2026 Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with…
Data Breach Phishing Ransomware Vulnerabilities13 Min Read February 16, 2026 Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons,…
Artificial Intelligence Data Protection6 Min Read February 16, 2026 Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation…
Mobile Security Spyware6 Min Read February 16, 2026 New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that's being advertised on Telegram as a…
Malware Threat Intelligence6 Min Read February 15, 2026 Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users…
Malware Threat Intelligence2 Min Read February 13, 2026 Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google…
Critical Infrastructure Malware4 Min Read February 13, 2026 Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights…
Cloud Security Cyber Espionage3 Min Read February 13, 2026 UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns…
Artificial Intelligence Browser Security6 Min Read February 13, 2026 Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business…
DevSecOps Supply Chain Security4 Min Read February 13, 2026 npm’s Update to Harden Their Supply Chain, and Points to Consider In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain…
Threat Intelligence Vulnerability5 Min Read February 13, 2026 Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged…
Artificial Intelligence Cyber Espionage5 Min Read February 12, 2026 Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI)…
Threat Intelligence Vulnerability4 Min Read February 12, 2026 Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked…
Cybersecurity Hacking News18 Min Read February 12, 2026 ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new…
Breach Prevention Enterprise Security3 Min Read February 12, 2026 The CTEM Divide: Why 84% of Security Programs Are Falling Behind A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between…
Network Security Vulnerability2 Min Read February 12, 2026 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be…
Anti-Malware Research16 Min Read February 11, 2026 LummaStealer Is Getting a Second Life Alongside CastleLoader Bitdefender researchers have discovered a surge in LummaStealer activity, showing how one of the world's most prolific information-stealing…
Patch Tuesday Vulnerability2 Min Read February 11, 2026 Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their…
Identity Security Threat Exposure3 Min Read February 11, 2026 Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools…
Vulnerability Windows Security5 Min Read February 11, 2026 Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said…
Botnet Linux3 Min Read February 11, 2026 SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC)…
Endpoint Security Malware5 Min Read February 10, 2026 Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring…
Identity Security Threat Intelligence6 Min Read February 10, 2026 From Ransomware to Residency: Inside the Rise of the Digital Parasite Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a…
Network Security Vulnerability1 Min Read February 10, 2026 Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code…
Application Security Artificial Intelligence3 Min Read February 10, 2026 ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the…
Cloud Security Malware Ransomware Windows14 Min Read February 10, 2026 Tech impersonators: ClickFix and MacOS infostealers Key points and observations Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and…
Endpoint Security Vulnerability3 Min Read February 9, 2026 SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed…