Two sophisticated ransomware families, BQTLock and GREENBLOOD, have surfaced in the cybersecurity landscape, utilizing contrasting strategies to disrupt business operations and extort victims. While typical ransomware attacks often follow a predictable pattern of immediate encryption, these new strains demonstrate a…
Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer
Cybercriminals have developed a sophisticated attack campaign that exploits user trust in artificial intelligence platforms to distribute the Atomic macOS Stealer (AMOS), marking a dangerous evolution in social engineering tactics. This new threat combines legitimate AI chatbot services from ChatGPT…
Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released
A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS score of 8.3/10, affects all versions up to 0.8.30 and…
Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware
A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has been active since 2016. This multi-functional malware combines cryptocurrency mining, credential theft, and remote-control capabilities to maintain long-term access to compromised systems. The Prometei botnet…
North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
IT Security News Hourly Summary 2026-02-11 18h : 11 posts
11 posts were published in the last hour 16:32 : Kimwolf Botnet Swamps Anonymity Network I2P 16:32 : AI Is Transforming Cybersecurity, but the Skills Gap Still Presents Significant Risk 16:32 : NDSS 2025 – MingledPie: A Cluster Mingling Approach…
Kimwolf Botnet Swamps Anonymity Network I2P
For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions…
AI Is Transforming Cybersecurity, but the Skills Gap Still Presents Significant Risk
AI is transforming cybersecurity, but without skilled people to manage it, organizations can increase risk. Learn how AI, training, and certifications must work together to close the cybersecurity skills gap. This article has been indexed from Industry Trends &…
NDSS 2025 – MingledPie: A Cluster Mingling Approach For Mitigating Preference Profiling In CFL
Session 12A: Federated Learning 2 Authors, Creators & Presenters: Cheng Zhang (Hunan University), Yang Xu (Hunan University), Jianghao Tan (Hunan University), Jiajie An (Hunan University), Wenqiang Jin (Hunan University) PAPER MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in…
Federal Court Fines FIIG $2.5 Million for Major Cybersecurity Breaches; Schools Push Phone-Free Policies
Fixed income manager FIIG Securities has been ordered by the Federal Court to pay $2.5 million in penalties over serious cybersecurity shortcomings. The ruling follows findings that the firm failed to adequately safeguard client data over a four-year period,…
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are…
Love Is in the Air — and So Are Scammers: Valentine’s Day 2026 Threats to Watch For
As Valentine’s Day 2026 approaches, people are turning to online shopping, digital dating, and last‑minute gift ideas. Unfortunately, cyber criminals are doing the same. Check Point researchers have identified a sharp rise in Valentine‑themed phishing websites, fraudulent stores, and fake…
Waikiki Drone Plan Sparks Privacy Pushback
Hawaii plans to use “first responder” drones in Waikiki to reach crime scenes and emergencies faster, and privacy advocates are sounding the alarm. The post Waikiki Drone Plan Sparks Privacy Pushback appeared first on TechRepublic. This article has been indexed…
Google Expands ‘Results About You’ to Shield IDs, Fight Deepfake Abuse
Google expands its “Results about you” tool to remove sensitive IDs and explicit images from Search, strengthening privacy protections amid rising identity theft. The post Google Expands ‘Results About You’ to Shield IDs, Fight Deepfake Abuse appeared first on TechRepublic.…
Windows Notepad RCE Flaw Exploits Markdown Files
Microsoft patched a Notepad flaw, CVE-2026-20841, that could enable remote code execution through malicious Markdown files. The post Windows Notepad RCE Flaw Exploits Markdown Files appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Were telcos tipped off to *that* ancient Telnet bug? Cyber pros say the signs stack up
Curious port filtering and traffic patterns suggest advisories weren’t the earliest warning signals sent Telcos likely received advance warning about January’s critical Telnet vulnerability before its public disclosure, according to threat intelligence biz GreyNoise.… This article has been indexed from…
Power Secure Swift Development at Scale With Sonatype Nexus Repository
From its beginnings as a language for Apple platforms, Swift Package Manager has expanded its reach considerably. It now powers a wide range of mobile, desktop, and server-side applications, as well as shared libraries, and is frequently adopted by large,…
CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA News Read the original article: CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure…
Super Bowl LX: Strengthening Preparation, Building Resilience, Fostering Partnerships
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Super Bowl LX: Strengthening Preparation, Building Resilience, Fostering Partnerships
Reynolds ransomware uses BYOVD to disable security before encryption
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements the Bring Your Own Vulnerable Driver (BYOVD) technique to disable security tools and evade…
Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses
Gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats. The post Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses appeared first on SecurityWeek. This article has been indexed from…
Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned. Some of it is automated scanning for vulnerable systems, but according to Greynoise and Defused, a suspected…
City Water Card Payments Hit by Cyberattack
A cybersecurity attack on a third-party processor has temporarily disabled online credit and debit card payments for San Angelo water bills. This article has been indexed from CyberMaterial Read the original article: City Water Card Payments Hit by Cyberattack
Germany Prepares Offensive Cyber Capabilities
Germany is drafting new legislation to authorize offensive cyber operations and expand the powers of its intelligence services to counter rising foreign threats. This article has been indexed from CyberMaterial Read the original article: Germany Prepares Offensive Cyber Capabilities