Armis has announced Armis Centrix for Application Security, which unifies application security across an organization’s software development lifecycle. The technology helps security teams secure code as a next-generation attack vector to fortify organizations’ defenses and protect against cyber threats. “To…
Trojanized 7-Zip downloads turn home computers into proxy nodes
A trojanized version of the popular 7-Zip software is quietly turning home computers into residential proxy nodes, Malwarebytes warns. Spurred by a Reddit post in which a user complained about getting infected with malware after downloading 7-Zip from 7zip[.]com instead…
BloodHound Scentry helps organizations reduce identity risk and close attack paths
SpecterOps has announced BloodHound Scentry, a new service designed to help customers accelerate their APM practice and reduce identity risk. BloodHound Scentry combines the power of BloodHound Enterprise with SpecterOps tradecraft experts and practitioners to provide customers with tailored guidance…
From Ransomware to Residency: Inside the Rise of the Digital Parasite
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which…
Fugitive Gets 20 Years In Crypto Scam
A U.S. This article has been indexed from CyberMaterial Read the original article: Fugitive Gets 20 Years In Crypto Scam
EU Says TikTok Faces Major Fine
The European Commission has issued preliminary findings stating that TikTok is in breach of the Digital Services Act due to addictive design features like infinite scroll and autoplay. This article has been indexed from CyberMaterial Read the original article: EU…
New Tool Blocks Imposter Command Attacks
Tirith is a new cross-platform, open-source tool designed to prevent homoglyph attacks by inspecting shell commands for deceptive URLs before they execute. This article has been indexed from CyberMaterial Read the original article: New Tool Blocks Imposter Command Attacks
Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes
A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into residential proxy nodes. The counterfeit site has been operating undetected for an extended period, exploiting user trust in what appears…
Global Cyber Attacks Rise in January 2026 Amid Increasing Ransomware Activity and Expanding GenAI Risks
Global Attack Volumes Climb Worldwide In January 2026, the global volume of cyber attacks continued its steady escalation. Organizations worldwide experienced an average of 2,090 cyber‑attacks per organization per week, marking a 3% increase from December and a 17% rise…
Coming Soon: Discord to Roll Out Global Age Verification Using Facial Scans, ID
Discord will soon roll out global age verification, using age inference plus video selfie or ID checks to limit access to sensitive content. Find out when. The post Coming Soon: Discord to Roll Out Global Age Verification Using Facial Scans,…
Attackers Weaponizing Windows Shortcut File to Deliver Global Group Ransomware
The cyber threat landscape is witnessing the resurgence of the Phorpiex botnet, a long-standing malware-as-a-service platform active for over a decade. In a recent high-volume campaign, attackers are distributing phishing emails with the deceptive subject line “Your Document.” These emails…
Windows Error Reporting Service Vulnerability Let Attackers Elevate Privileges – PoC Released
A critical security flaw in Windows Error Reporting Service has been discovered, allowing attackers with standard user access to escalate their privileges to SYSTEM-level control. CVE-2026-20817, patched by Microsoft in January 2026, represents a significant threat to Windows environments due…
VoidLink Linux C2 Highlights LLM-Generated Malware with Multi-Cloud and Kernel-Level Stealth
A sophisticated Linux malware framework known as VoidLink has emerged as a concerning example of AI-assisted threat development, combining advanced multi-cloud targeting capabilities with kernel-level stealth mechanisms. The malware represents a new generation of cyber threats where large language models…
Threat Actors Exploiting React2Shell Vulnerability Using AI-Generated Malware
A fully AI-generated malware campaign actively exploiting the “React2Shell” vulnerability, detected within Darktrace’s “CloudyPots” global honeypot network, the intrusion highlights a critical shift in cybercrime: the weaponization of Large Language Models (LLMs) to lower the barrier of entry for effective…
How safe are kids using social media? We did the groundwork
Our research found that mainstream platforms often protect children well—until curiosity or the wrong settings get in the way. This article has been indexed from Malwarebytes Read the original article: How safe are kids using social media? We did the…
Singapore spent 11 months booting China-linked snoops out of telco networks
Operation Cyber Guardian involved 100-plus staff across government and industry Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country’s largest cyber defense operation to date.… This…
New Mobile Spyware ZeroDayRAT Targets Android and iOS
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access This article has been indexed from www.infosecurity-magazine.com Read the original article: New Mobile Spyware ZeroDayRAT Targets Android and iOS
“Digital Parasite” Warning as Attackers Favor Stealth for Extortion
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden This article has been indexed from www.infosecurity-magazine.com Read the original article: “Digital Parasite” Warning as Attackers Favor Stealth for Extortion
China-Linked DKnife Targets Routers
Cybersecurity researchers have uncovered DKnife, a sophisticated gateway-monitoring and adversary-in-the-middle framework utilized by Chinese threat actors since 2019 to target edge devices. This article has been indexed from CyberMaterial Read the original article: China-Linked DKnife Targets Routers
Germany Warns of Signal Phishing Attacks
German security agencies have issued a joint warning regarding a sophisticated phishing campaign on Signal that targets high-ranking political, military, and journalistic figures. This article has been indexed from CyberMaterial Read the original article: Germany Warns of Signal Phishing Attacks
Spain Science Ministry Shuts Systems
The Spanish Ministry of Science has partially suspended its information technology systems and administrative services following a significant technical incident. This article has been indexed from CyberMaterial Read the original article: Spain Science Ministry Shuts Systems
Norway Discloses Salt Typhoon Target
Norway’s domestic security agency has confirmed that the Chinese state-sponsored group Salt Typhoon successfully compromised various network devices within the country. This article has been indexed from CyberMaterial Read the original article: Norway Discloses Salt Typhoon Target
Hacker Attack Hits Uffizi Museum
The Uffizi Gallery in Florence successfully maintained public operations and visitor services after a weekend cyberattack targeted its internal administrative servers and staff email systems. This article has been indexed from CyberMaterial Read the original article: Hacker Attack Hits Uffizi…
IT Security News Hourly Summary 2026-02-10 15h : 11 posts
11 posts were published in the last hour 13:32 : Man tricked hundreds of women into handing over Snapchat security codes 13:32 : New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices 13:32 : How the Supreme Court’s…