A newly uncovered cloaking platform called 1Campaign is giving cybercriminals a powerful tool to push malicious advertisements through Google’s ad review system, putting everyday users at serious risk of phishing scams and cryptocurrency theft. Google Ads is one of the most trusted…
Category: Cyber Security News
Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days
A cleverly crafted fake Zoom website has silently pushed surveillance software onto Windows machines, infecting 1,437 users globally in just 12 days. The campaign, first detected on February 11, 2026, on the Microsoft Defender for Endpoint (MDE) platform, used a…
New $300 Android RAT With Automated Permission Bypass and Hidden Remote Control
A newly discovered Android Remote Access Trojan (RAT) named Oblivion is raising serious concerns across the mobile security community. Sold on a public hacking forum for as little as $300 a month, this malware is built to silently take over…
ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices
A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to the mobile devices of journalists and civil society members. First publicly reported in December 2025 through a joint investigation by…
Wireshark 4.6.4 Released With Fix for Multiple Security Vulnerabilities
The Wireshark Foundation has officially released Wireshark 4.6.4, a significant maintenance update for the world’s most popular network protocol analyzer. This release addresses multiple security vulnerabilities and resolves various functional bugs that could impact stability and performance. Network administrators, security…
Sophisticated SeaFlower Backdoor Campaign Targets Web3 Wallets to Steal Seed Phrases
A highly sophisticated and previously unreported threat campaign dubbed SeaFlower (藏海花) has been actively targeting users of popular Web3 cryptocurrency wallets, embedding stealthy backdoors into cloned versions of legitimate applications to silently steal seed phrases and drain victims’ funds. The…
DarkCloud Infostealer Emerges as Major Threat With Scalable Credential Theft Targeting Enterprises
The cybersecurity threat landscape is facing a growing challenge as infostealers continue to dominate the initial access ecosystem in 2026. Among the latest threats drawing serious attention is DarkCloud, a commercially available credential-harvesting malware that proves even low-cost tools can…
Steaelite RAT Fuels New Wave of Double Extortion Threats Targeting Enterprises
A newly emerged remote access trojan (RAT) called Steaelite is raising serious concerns across enterprise security teams. First spotted on underground cybercrime networks in November 2025, this malware merges two traditionally separate attack stages — data theft and ransomware deployment…
New Claude Code Enables Remote Control of Your Terminal Session From Your Phone
Anthropic has launched a new “Remote Control” feature for its agentic terminal tool, Claude Code. His capability allows developers to start tasks in their local terminal and continue managing them from a mobile device or browser. Currently in Research Preview…
Critical ServiceNow AI Platform Vulnerability Enables Remote Code Execution
A critical vulnerability in an enterprise AI platform has been patched, addressing a flaw that could allow unauthenticated remote code execution. Tracked as CVE-2026-0542, this security flaw poses a significant risk to organizations using the ServiceNow AI Platform. The vulnerability…
OpenAI Confirms that Chinese Hackers Used ChatGPT to Launch Cyberattacks
OpenAI has officially confirmed that a ChatGPT account linked to an individual associated with Chinese law enforcement was used to plan and document large-scale covert cyberattack campaigns. The revelation, published in OpenAI’s February 2026 threat disruption report, marks one of…
PoC Released for Windows Vulnerability That Allows Attackers to Cause Unrecoverable BSOD Crashes
A proof-of-concept (PoC) exploit has been publicly released for CVE-2026-2636, a newly documented vulnerability in Windows’ Common Log File System (CLFS) driver that allows any low-privileged, unprivileged user to instantly crash a target system into an unrecoverable Blue Screen of Death…
27 Years old Telnet Vulnerability Enables Attackers to Gain Root Access
A newly confirmed vulnerability in the telnet daemon (telnetd) in GNU Inetutils has revived a 27-year-old security flaw, allowing attackers to gain root access by exploiting improper sanitization of environment variables, with no authentication required. Tracked as CVE-2026-24061, the flaw exists…
Critical Claude Code Vulnerabilities Enables Remote Code Execution Attacks
A critical security flaw in Anthropic’s Claude Code demonstrates how threat actors can exploit repository configuration files to execute malicious code and steal sensitive API keys. The vulnerabilities, tracked as CVE-2025-59536 and CVE-2026-21852, highlight a significant shift in the software…
Firefox 148 Released With Sanitizer API to Disable XSS Attack
Firefox 148 introduces the new standardized Sanitizer API, becoming the first browser to implement it. The update marks a major step forward for web security, giving developers a straightforward and effective way to prevent Cross-Site Scripting (XSS) attacks. XSS is…
Google Disrupts Chinese Hackers Infrastructre which Breached 53 Telecom and Government Entities
A suspected Chinese state-linked hacking group has been caught running one of the most far-reaching cyber espionage operations ever uncovered — silently breaching telecom providers and government bodies across four continents for nearly a decade. Google has now stepped in…
Kali Linux Integrates Claude AI for Penetration Testing via Model Context Protocol
Kali Linux has officially introduced a native AI-assisted penetration testing workflow, enabling security professionals to issue natural-language commands through Anthropic’s Claude AI, which are then translated into live terminal commands on a Kali Linux environment, all bridged via the open-source…
Hacker Jailbreaks Claude AI to Write Exploit Code and Steal Government Data
A hacker exploited Anthropic’s Claude AI chatbot over a month-long campaign starting in December 2025, using it to identify vulnerabilities, generate exploit code, and exfiltrate sensitive data from Mexican government agencies. Cybersecurity firm Gambit Security uncovered the breach, revealing how…
Critical Cisco SD-WAN 0-Day Vulnerability Exploited Since 2023 to Gain Root Access
Cisco has disclosed a critical zero-day vulnerability in its Catalyst SD-WAN products that threat actors have exploited since 2023 to bypass authentication and achieve root access. Tracked as CVE-2026-20127, the flaw affects core networking components and prompts urgent patching amid…
Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications
A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control (C2) channel by attackers. Since this feature runs inside a trusted endpoint detection and response (EDR) agent, the…