Infy group’s new attack tactic An Iranian hacking group known as Infy (aka Prince of Persia) has advanced its attack tactics to hide its operations. The group also made a new C2 infrastructure while there was a wave of internet…
Author: IT Security News Bot
Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices
DKnife is a Chinese made malware framework that targets Chinese-based users This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices
IT Security News Hourly Summary 2026-02-06 18h : 7 posts
7 posts were published in the last hour 16:34 : Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing 16:34 : Substack Confirms Data Breach, “Limited User Data” Compromised 16:5 : AI Threats, Botnets, and Cloud Exploits Define This Week’s…
Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing
Microsoft has released LiteBox, an experimental open-source library OS designed to sandbox applications while reducing their exposure to host systems. Written in Rust and published under the MIT license, LiteBox reflects the company’s efforts to upgrade software security as confidential…
Substack Confirms Data Breach, “Limited User Data” Compromised
Substack did not specify the number of users affected by the data breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Substack Confirms Data Breach, “Limited User Data” Compromised
AI Threats, Botnets, and Cloud Exploits Define This Week’s Cyber Risks
Weekly summary of Cybersecurity Insider newsletters The post AI Threats, Botnets, and Cloud Exploits Define This Week’s Cyber Risks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: AI Threats, Botnets, and…
China’s Salt Typhoon hackers broke into Norwegian companies
Norway’s government accused China’s Salt Typhoon hacking group of conducting a cyberespionage campaign in the country. This article has been indexed from Security News | TechCrunch Read the original article: China’s Salt Typhoon hackers broke into Norwegian companies
Moltbook: Cutting Through the AI Hype to the Real Security Risks
Moltbook has exploded into the security and AI communities with remarkable speed. In a matter of days, it has gone from an experimental curiosity to a viral talking point, with some observers framing it as a glimpse into autonomous AI…
Fraud Prevention Is a Latency Game
There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review it and decide if it’s legitimate before the payment clears or if the account could be compromised. That window happens…
A Quiet Breach of a Familiar Tool, Notepad++
For six months last year the update system of Notepad++, one of the world’s most widely used Windows text editors, was quietly subverted by hackers linked by investigators to the Chinese state. The attackers used their access not to disrupt…
AISURU/Kimwolf Botnet Behind Record 31.4 Tbps DDoS Attack, Cloudflare Reveals
A massive distributed denial-of-service (DDoS) assault reaching an unprecedented peak of 31.4 terabits per second (Tbps) has been attributed to the AISURU/Kimwolf botnet. The attack, which lasted just 35 seconds, is now being described as one of the largest…
Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025, which Cloudflare automatically detected and blocked. The AISURU/Kimwolf botnet was linked to a record-breaking DDoS attack that peaked at 31.4 Tbps and lasted just 35…
Flickr Notifies Users of Data Breach After External Partner Security Flaw
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Flickr Notifies Users…
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate…
New Wave of Odyssey Stealer Actively Targeting macOS Users
A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems. This fresh wave of cyber threats has caught the attention of security experts due to its rapid spread and enhanced stealth capabilities.…
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
Cracked game installers are again being used as a delivery channel for credential theft, but the latest wave adds an unusual twist: the malicious code hides behind a Ren’Py game launcher. The loader, now tracked as RenEngine, arrives bundled with…
China-Nexus Hackers Hijacking Linux-Based Devices to Manipulate Traffic and Deploy Malware
A sophisticated surveillance and attack framework dubbed “DKnife” has recently emerged, posing a significant threat to network security. Attributed to China-nexus threat actors, this malicious toolset specifically targets Linux-based routers and edge devices. By compromising these critical network gateways, attackers…
CISA Orders Removal of Active Network Edge Devices to Reduce Security Risks
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks. This directive, developed in coordination with the Office of Management and Budget (OMB), addresses…
Apple Pay phish uses fake support calls to steal payment details
This Apple Pay phishing campaign is designed to funnel victims into fake Apple Support calls, where scammers steal payment details. This article has been indexed from Malwarebytes Read the original article: Apple Pay phish uses fake support calls to steal…
State-backed phishing attacks targeting military officials and journalists on Signal
German security authorities are warning that a likely state-backed hacking group is engaged in attempts at phishing senior political figures, military officials, diplomats, and investigative journalists across Germany and Europe via Signal. The authorities also noted that while these attacks…