Microsoft Starts 2026 With a Bang: A Freshly Exploited Zero-Day – Dark Reading
The vendor’s first Patch Tuesday of the year also contains fixes for 112 CVEs, nearly double the amount from last month. – Read More
The vendor’s first Patch Tuesday of the year also contains fixes for 112 CVEs, nearly double the amount from last month. – Read More
Attackers use a sophisticated delivery mechanism of text-only files for RAT deployment, showcasing a clever way to bypass defensive tools and rely on the target’s own utilities. – Read More
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust. – Read More
Massive data dump reveals real identities and details of administrators and members of the notorious hacker forum. – Read More
Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations. – Read More
No matter what new laws or regulations make the cut for 2026, it’s clear that compliance challenges will persist and federal legislation will be limited. – Read More
A state-sponsored threat group tracked as “Kimsuky” sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions. – Read More
Post Content – Read More
A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations’ use of AI and map an expanding attack surface. – Read More
Deepfakes are becoming more realistic and more popular. Luckily, defenders are still ahead in the arms race. – Read More
Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump. – Read More
“Fancy Bear” relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations. – Read More
The CrowdStrike-SGNL deal underscores how identity security has become a critical component of enterprise cybersecurity as companies add cloud services and deploy AI-driven tools. – Read More
Exploitation of CVE-2025-37164 can enable remote code execution on HPE’s IT infrastructure management platform, leading to devastating consequences. – Read More
Threat actors ripped off a legitimate AI-powered Chrome extension in order to harvest ChatGPT and DeepSeek data before sending it to a C2 server. – Read More