6 posts were published in the last hour 10:34 : Amnesia RAT deployed in multi-stage phishing attacks against Russian users 10:34 : He Who Controls the Key Controls the World – Microsoft “Often” Provides BitLocker Keys to Law Enforcement 10:5…
Amnesia RAT deployed in multi-stage phishing attacks against Russian users
A multi-stage phishing campaign targets users in Russia with ransomware and Amnesia RAT using fake business documents as lures. FortiGuard Labs researchers uncovered a multi-stage malware campaign mainly targeting users in Russia. The attack uses fake business documents as social…
He Who Controls the Key Controls the World – Microsoft “Often” Provides BitLocker Keys to Law Enforcement
Encryption doesn’t guarantee privacy—key ownership does. This article explains how cloud-stored encryption keys let third parties unlock your data, exposing the hidden risks behind “secure” services like BitLocker and Gmail. The post He Who Controls the Key Controls the World…
France Lower House Approves Social Media Ban
France’s National Assembly approves key measures in social media ban for under-15s amid international momentum for restrictions This article has been indexed from Silicon UK Read the original article: France Lower House Approves Social Media Ban
China-Aligned APTs Use PeckBirdy C&C Framework in Multi-Vector Attacks, Exploiting Stolen Certificates
Since 2023, a dangerous malware framework called PeckBirdy has emerged as a primary weapon used by Chinese-aligned hacking groups. This JavaScript-based tool serves as a command-and-control platform designed to work across multiple system environments, giving attackers remarkable flexibility in how…
Multiple Vulnerabilities in React Server Components Enable DoS Attacks
Multiple critical security vulnerabilities have recently been disclosed in React Server Components, enabling threat actors to launch Denial-of-Service (DoS) attacks against vulnerable servers. The flaws, tracked as CVE-2026-23864 with a CVSS score of 7.5, are due to incomplete patches from…
APT Hackers Attacking Indian Government Using GOGITTER Tool and GITSHELLPAD Malware
Advanced persistent threat actors operating from Pakistan have launched coordinated attacks against Indian government organizations using newly discovered tools and malware designed to bypass security defenses. The campaign, identified as Gopher Strike, emerged in September 2025 and represents a significant…
Critical Vulnerability in Python PLY Library Enables Remote Code Execution – PoC Published
A critical vulnerability has been identified in the PyPI-distributed version of PLY (Python Lex-Yacc) 3.11, allowing arbitrary code execution through unsafe deserialization of untrusted pickle files. The vulnerability, assigned CVE-2025-56005, affects the undocumented picklefile parameter in the yacc() function, which remains absent from official…
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files
Caminho Loader is a new Loader-as-a-Service threat that blends steganography, fileless execution, and cloud abuse to quietly deliver malware across several regions. First seen in March 2025 and believed to originate from Brazil, this service hides .NET payloads inside harmless-looking…
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump This article has been indexed from www.infosecurity-magazine.com Read the original article: World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
Germany To Strengthen Cyber Countermeasures
Germany plans to enable and deploy stronger cyber-attack countermeasures to take action against foreign powers such as Russia This article has been indexed from Silicon UK Read the original article: Germany To Strengthen Cyber Countermeasures
Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)
Microsoft released emergency Office security updates to fix a security feature bypass vulnerability (CVE-2026-21509) that its threat intelligence and security teams spotted being exploited in the wild in zero-day attacks. Users and admins are advised to review the associated advisory…
Microsoft Begins Deploying Next-Gen AI Chip
Microsoft now beginning to deploy new in-house AI chip Maia 200 within its own AI team and to power Copilot, following delays This article has been indexed from Silicon UK Read the original article: Microsoft Begins Deploying Next-Gen AI Chip
Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
The vulnerability is tracked as CVE-2026-21509 and it can be exploited to bypass security features. The post Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Why Cyber Fusion Centers and Zero-Trust Work Better Together
Cyber fusion centers make zero-trust more effective by improving visibility, automating response, and shrinking the window for attacks. The post Why Cyber Fusion Centers and Zero-Trust Work Better Together appeared first on Security Boulevard. This article has been indexed from…
Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass…
Google Pays $68m To Settle Assistant Privacy Claims
Google agrees to pay $68m to settle class action claiming digital assistant recorded private conversations, passed data to advertisers This article has been indexed from Silicon UK Read the original article: Google Pays $68m To Settle Assistant Privacy Claims
Zscaler expands AI security capabilities to deliver visibility, control, and governance
Zscaler has announced new AI security innovations designed to empower enterprises to secure the fast growing use of AI, while maintaining visibility, control, and governance. As organizations adopt generative AI and prepare for the use of agentic AI, they face…
Microsoft patches Office zero-day vulnerability, Indian users targeted by Blackmoon, Konni targets blockchain developers
Microsoft patches Office zero-day vulnerability Indian users targeted by Blackmoon Konni targets blockchain developers Huge thanks to our episode sponsor, Conveyor True story, an infosec team had to give customers MapQuest style directions just to navigate their Trust Center. …
EU Probes X Over Grok Images
EU opens new investigation into X, formerly Twitter, after millions of AI-generated sexualised images flood network This article has been indexed from Silicon UK Read the original article: EU Probes X Over Grok Images
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer. This article has been indexed from Securelist Read the original…
Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools
Cybercriminals are increasingly distributing malicious Remote Monitoring and Management (RMM) tools through fake websites that mimic popular software download pages. These deceptive sites impersonate legitimate utilities like Notepad++ and 7-Zip, tricking users into installing remote access tools such as LogMeIn…
IT Security News Hourly Summary 2026-01-27 09h : 5 posts
5 posts were published in the last hour 7:32 : Dormakaba flaws allow to access major organizations’ doors 7:31 : When open science meets real-world cybersecurity 7:31 : Logitech introduces two Rally AI Cameras designed for large spaces 7:31 :…
Dormakaba flaws allow to access major organizations’ doors
Researchers found over 20 flaws in Dormakaba access systems that could let attackers remotely unlock doors at major organizations. Researchers from SEC Consult discovered and fixed more than 20 security flaws in Dormakaba physical access control systems. The experts uncovered…