CSO Online

Dark Reading

Dark Web Informer

Europol

Krebs on Security

NSA

Reuters

Security Affairs

The Hacker News

Wired

ZDNET

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Sat Feb 28 2026

Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk." "This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of Americans and fully autonomous weapons," the...

The Hacker News

Security hole could let hackers take over Juniper Networks PTX core routers

Fri Feb 27 2026

Network admins with Juniper PTX series routers in their environments are being warned to patch immediately, because a newly-discovered critical vulnerability could lead to an unauthenticated threat ac

CSO Online

‘Silent’ Google API key change exposed Gemini AI data

Fri Feb 27 2026

Google Cloud API keys, normally used as simple billing identifiers for APIs such as Maps or YouTube, could be scraped from websites to give access to private Gemini AI project data, researchers from T

CSO Online

Aeternum botnet hides commands in Polygon smart contracts

Fri Feb 27 2026

Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to detect and disrupt. Qrator Labs researchers uncovered Aeternum, a botnet that runs its command-and-control infrastructure through smart contracts on the Polygon blockchain. By decentralizing its C2, the malware avoids traditional server-based takedowns and becomes far harder to disrupt or shut down, […]

Security Affairs

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

Fri Feb 27 2026

The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added. "Criminal...

The Hacker News

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Fri Feb 27 2026

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France. The non-profit entity said the compromises are likely...

The Hacker News

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Fri Feb 27 2026

Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate "golang.org/x/crypto" codebase, but injects malicious code that's responsible for exfiltrating secrets entered via terminal password...

The Hacker News

iPhone and iPad are the first consumer devices cleared for NATO ‘RESTRICTED’ classification

Fri Feb 27 2026

Apple’s iPhone and iPad are now NATO-approved for classified use, listed in the alliance’s Information Assurance Product Catalogue. Apple announced that its iPhone and iPad have received NATO approval to handle classified information. The devices are now officially listed in the NATO Information Assurance Product Catalogue (NIAPC), allowing military personnel to use them securely for […]

Security Affairs

One of the ‘most influential cybersecurity’ roles will pay under $175,000

Fri Feb 27 2026

A recent job ad  is causing plenty of head-shaking, suggesting that some government high-ups  appear to be out of touch with the current state of the cybersecurity job market.

CSO Online

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Fri Feb 27 2026

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware...

The Hacker News

Your personal OpenClaw agent may also be taking orders from malicious websites

Fri Feb 27 2026

If you thought running an AI agent locally kept it safely inside your machine’s walls, you’re in for a surprise.

CSO Online

Juniper issues emergency patch for critical PTX router RCE

Fri Feb 27 2026

Juniper released an emergency patch for Junos OS Evolved to fix CVE-2026-21902, a critical RCE flaw affecting PTX routers. Juniper Networks issued an out-of-band security update for Junos OS Evolved to address a critical remote code execution vulnerability, tracked as CVE-2026-21902 (CVSS score of 9.3), impacting PTX routers. The company urges customers to apply the […]

Security Affairs

US authorities punish sellers of malware and spyware

Fri Feb 27 2026

The US authorities have made it clear that they will have no truck with any individuals trying to by-pass regulations on trading cyberweapons with hostile powers.

CSO Online

Why application security must start at the load balancer

Fri Feb 27 2026

For a long time, I thought of the load balancer as a performance device.

CSO Online

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Fri Feb 27 2026

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar," the Microsoft Threat Intelligence team said in a post on X. "This downloader used PowerShell...

The Hacker News

Enterprise Spotlight: Data Center Modernization

Fri Feb 27 2026

CSO Online

Data Broker Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

Fri Feb 27 2026

A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional Democrats say breaches tied to the industry have cost people tens of billions of dollars.

Wired

How to make LLMs a defensive advantage without creating a new attack surface

Fri Feb 27 2026

Large language models (LLMs) have arrived in security in three different forms at once: as productivity tools that sit beside analysts, as components embedded inside products and workflows and as targ

CSO Online

How AI Aids Incident Response: Why Humans Alone Cannot Do IR Efficiently

Fri Feb 27 2026

AI accelerates incident response by correlating alerts and generating reports in minutes, helping teams scale beyond manual limits. Incident response has always been a race against the clock. It starts ticking the moment an alert is triggered, and each minute thereafter can lead to lost revenue, regulatory exposure, reputational damage, or customer churn. Traditionally, incident […]

Security Affairs

12 Million exposed .env files reveal widespread security failures

Fri Feb 27 2026

Mysterium VPN found 12M IPs exposing .env files, leaking credentials and revealing widespread security misconfigurations worldwide. Configuration mistakes rarely trigger alarms. A forgotten deny rule, an overlooked server setting, or a full project folder uploaded to production can quietly expose a company’s most sensitive secrets. In many cases, those secrets live inside simple environment files […]

Security Affairs

ManoMano data breach impacted 38 Million customer accounts

Fri Feb 27 2026

European DIY platform ManoMano suffered a data breach via a third-party provider, exposing personal data of 38 million customers. European DIY e-commerce platform ManoMano disclosed a major data breach affecting 38 million customers. Hackers accessed personal information by compromising a third-party service provider, prompting notifications and potential security measures for impacted users across multiple countries. […]

Security Affairs

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Fri Feb 27 2026

Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers' methods of payment have been suspended, related accounts have been disabled, and the website domain names used to pull off the scams have been blocked. Concurrently, the social...

The Hacker News

The CSO guide to top security conferences

Fri Feb 27 2026

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have

CSO Online

Ransomware groups switch to stealthy attacks and long-term access

Fri Feb 27 2026

Ransomware attackers are switching tactics in favor of more stealthy infiltration, as the threat of public exposure of sensitive corporate data is becoming the main mechanism of extortion.

CSO Online

Trend Micro fixes two critical flaws in Apex One

Thu Feb 26 2026

Trend Micro fixed two critical Apex One flaws enabling remote code execution on vulnerable Windows systems and urged immediate updates. Trend Micro has addressed two critical vulnerabilities in Apex One that could allow attackers to achieve remote code execution on affected Windows systems. The company released security updates and strongly urged customers to apply the […]

Security Affairs

UAT-10027 campaign hits U.S. education and healthcare with stealthy Dohdoor backdoor

Thu Feb 26 2026

UAT-10027 campaign is targeting U.S. education and healthcare sectors to deploy a new Dohdoor backdoor. Cisco Talos has identified a new threat cluster, tracked as UAT-10027, targeting U.S. education and healthcare organizations since at least December 2025 to deploy a previously unseen backdoor named Dohdoor. Initial access likely occurs through phishing, triggering a PowerShell script […]

Security Affairs

Hacker kompromittieren immer schneller

Fri Feb 27 2026

Der Einsatz von KI-Tools macht Cyberangriffe nicht nur schneller, sondern erhöht auch die Taktzahl.

CSO Online

This AI Agent Is Designed to Not Go Rogue

Thu Feb 26 2026

The new open source project IronCurtain uses a unique method to secure and constrain AI assistant agents before they flip your digital life upside down.

Wired

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Thu Feb 26 2026

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain," Qrator Labs said in a report shared with The...

The Hacker News

U.S. CISA adds Cisco SD-WAN flaws to its Known Exploited Vulnerabilities catalog

Thu Feb 26 2026

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco SD-WAN flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Cisco SD-WAN flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: This week, Cisco warned of a critical Cisco SD-WAN vulnerability, tracked […]

Security Affairs

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

Thu Feb 26 2026

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor. "Dohdoor utilizes the DNS-over-HTTPS (DoH)...

The Hacker News

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

Thu Feb 26 2026

Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder. Here is a quick look at the signals worth paying attention to. AI-powered command...

The Hacker News

Expert Recommends: Prepare for PQC Right Now

Thu Feb 26 2026

Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extortion generated funding for a complex and highly professional criminal ecosystem. The era of the cloud brought general availability of...

The Hacker News

Hackers abused Cisco SD-WAN zero-day since 2023 to gain full admin control

Thu Feb 26 2026

Cisco SD-WAN vulnerability CVE-2026-20127 has been exploited since 2023 to gain unauthenticated admin access. A critical Cisco SD-WAN vulnerability, tracked as CVE-2026-20127 (CVSS score of 10.0), has been actively exploited since 2023. The flaw affects Catalyst SD-WAN Controller and Manager and allows remote, unauthenticated attackers to bypass authentication and gain full administrative access by sending […]

Security Affairs

China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries

Thu Feb 26 2026

Google has disrupted a China-linked espionage group that used Google’s spreadsheet application as a covert spy tool to compromise telecom providers and government agencies across 42 countries, sending

CSO Online

Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

Thu Feb 26 2026

A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. "The activity aligns with a broader cluster of threats that use job-themed lures to blend into routine developer workflows and increase the likelihood of code...

The Hacker News

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

Thu Feb 26 2026

Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by a user named...

The Hacker News

Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries

Thu Feb 26 2026

Google and partners disrupted UNC2814, a suspected China-linked group that hacked 53 organizations across 42 countries. Google, with industry partners, disrupted the infrastructure of UNC2814, a suspected China-linked cyber espionage group that breached at least 53 organizations in 42 countries. The group has been active since at least 2017, and was spotted targeting governments and […]

Security Affairs

The farmers and the mercenaries: Rethinking the ‘human layer’ in security

Thu Feb 26 2026

There’s a phrase that’s become gospel in cybersecurity: “Employees are the last line of defense.

CSO Online

5 trends that should top CISO’s RSA 2026 agendas

Thu Feb 26 2026

RSA 2026 is still weeks away and the hype machine is humming.

CSO Online

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

Thu Feb 26 2026

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain...

The Hacker News

9 unverzichtbare Open-Source-Security-Tools

Thu Feb 26 2026

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint.

CSO Online

So rechtfertigen Sie Ihre Security-Investitionen

Thu Feb 26 2026

Lesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.

CSO Online

Steaelite RAT combines data theft and ransomware management capability in one tool

Thu Feb 26 2026

It’s bad enough that threat actors are leveraging AI for their attacks, but now they can also access a new remote access trojan (RAT) that makes it easy to launch data theft and ransomware attacks on

CSO Online

Untrusted repositories turn Claude code into an attack vector

Wed Feb 25 2026

Flaws in Anthropic’s Claude Code could allow remote code execution and theft of API keys when users open untrusted repositories. Check Point Research team found multiple vulnerabilities in Anthropic’s Claude Code AI coding assistant that could lead to remote code execution and API key theft. The vulnerabilities abuse features such as Hooks, MCP servers, and […]

Security Affairs

Critical Zyxel router flaw exposed devices to remote attacks

Wed Feb 25 2026

Zyxel fixed a critical flaw in multiple routers that lets unauthenticated attackers remotely execute commands on vulnerable devices. Zyxel addressed a critical remote code execution vulnerability, tracked as CVE-2025-13942 (CVSS score of 9.8), affecting more than a dozen router models. A command injection flaw in the UPnP feature of several Zyxel CPEs, Fiber ONTs, and […]

Security Affairs

Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day

Wed Feb 25 2026

Cybersecurity agencies across the Five Eyes alliance have issued an emergency directive warning that a critical Cisco SD-WAN vulnerability is being actively exploited to gain unauthorized access to fe

CSO Online

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Wed Feb 25 2026

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,"...

The Hacker News

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Wed Feb 25 2026

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing...

The Hacker News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

Wed Feb 25 2026

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to...

The Hacker News

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Wed Feb 25 2026

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up as missed SLAs, higher cost per case, and more room for real threats to slip through. So where does triage go wrong? Here are five triage...

The Hacker News

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Wed Feb 25 2026

Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications....

The Hacker News

ShinyHunters cyberattack on CarGurus impacts 12.4 Million users

Wed Feb 25 2026

ShinyHunters leaked data from 12.4M CarGurus accounts, exposing personal information from the U.S.-based auto research and shopping platform. The ShinyHunters group published personal data from over 12 million CarGurus accounts. CarGurus is a U.S.-based digital automotive marketplace that helps users research, compare, and connect with sellers of new and used vehicles. Operating in the U.S., […]

Security Affairs

Former U.S. Defense contractor executive sentenced for selling zero-day exploits to Russian broker Operation Zero

Wed Feb 25 2026

A former employee at U.S. defense contractor L3Harris got over 7 years in prison for selling eight zero-days to a Russian broker. Peter Williams, a 39-year-old Australian former L3Harris employee, received a prison sentence of just over seven years for selling eight zero-day exploits to the Russian broker Operation Zero for millions. Williams pleaded guilty […]

Security Affairs

Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors

Wed Feb 25 2026

Microsoft says it has uncovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.

CSO Online

Manual Processes Are Putting National Security at Risk

Wed Feb 25 2026

Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This should alarm every defense and government leader because manual handling of sensitive data is not just inefficient, it is a systemic...

The Hacker News

Ukrainian convicted for helping fake North Korean IT workers

Wed Feb 25 2026

A Ukrainian man has been sentenced to five years in prison after helping North Korean IT workers infiltrate American companies using stolen identities, reports Bleepingcomputer.

CSO Online

U.S. CISA adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog

Wed Feb 25 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Soliton Systems K.K FileZen flaw, tracked as CVE-2026-25108 (CVSS v4 score of 8.7), to its Known Exploited Vulnerabilities (KEV) catalog. Soliton Systems K.K. FileZen is a […]

Security Affairs

Lazarus APT group deployed Medusa Ransomware against Middle East target

Wed Feb 25 2026

North Korea’s Lazarus Group used Medusa ransomware in an attack on an unnamed Middle East organization, researchers report. The North Korea-linked Lazarus APT Group, also known as Diamond Sleet and Pompilus, has been spotted deploying Medusa ransomware against an unnamed organization in the Middle East, according a new report from the Symantec and Carbon Black […]

Security Affairs

How Mexico's ‘CJNG’ Drug Cartel Embraced AI, Drones, and Social Media

Wed Feb 25 2026

Drug kingpin Nemesio “El Mencho” Oseguera Cervantes may be dead, but the Jalisco cartel he ran for years will likely outlive him—thanks, in part, to the criminal group’s embrace of technology.

Wired

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

Wed Feb 25 2026

A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guilty to two counts of theft of trade secrets in October 2025. In addition to the jail term, Williams...

The Hacker News

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

Wed Feb 25 2026

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary...

The Hacker News

Boards don’t need cyber metrics — they need risk signals

Wed Feb 25 2026

Security teams live in a world of numbers.

CSO Online

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

Wed Feb 25 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute...

The Hacker News

Hacker knackt 600 Firewalls in einem Monat – mit KI

Wed Feb 25 2026

Bedrohungsakteure setzen zunehmend KI-Tools ein, um ihre Angriffe durchzuführen.

CSO Online

So verändert KI Ihre GRC-Strategie

Wed Feb 25 2026

Rob Schultz / Shutterstock Da Unternehmen Cybersicherheit in ihre GRC (Governance, Risk & Compliance)-Prozesse integrieren, müssen bestehende Programme überarbeitet werden.

CSO Online

New Serv-U bugs extend SolarWinds’ run of high-severity disclosures

Wed Feb 25 2026

SolarWinds continues to be besieged by security issues, this time in its Serv-U managed file transfer server.

CSO Online

Fake Zoom meeting silently installs surveillance software, says Malwarebytes

Wed Feb 25 2026

The latest fake Zoom meeting scam silently pushes surveillance software onto the Windows computers of unwitting employees.

CSO Online

VMware fixes command injection flaw in Aria Operations

Wed Feb 25 2026

VMware has released patches for several high- and medium-risk vulnerabilities that impact its Aria Operations, Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure products.

CSO Online

Here’s What a Google Subpoena Response Looks Like, Courtesy of the Epstein Files

Tue Feb 24 2026

The US Justice Department disclosures give fresh clues about how tech companies handle government inquiries about your data.

Wired

What does business email compromise look like?

Tue Feb 24 2026

Business email compromise (BEC) is the digital con dressed to impress.

CSO Online

What are the types of ransomware attacks?

Tue Feb 24 2026

Ransomware isn’t an isolated, potential cyber threat—it’s like a living organism that can shapeshift with multiple strains, tactics, and targets.

CSO Online

Take control: Locking down common endpoint vulnerabilities

Tue Feb 24 2026

Attackers are constantly on the prowl, scoping out vulnerabilities of network-connected devices in your systems.

CSO Online

How to prevent business email compromise

Tue Feb 24 2026

Business email compromise (BEC) is the cyber equivalent of an expertly forged handwritten note—no malware fireworks, no flashing warnings, just a convincing request that tricks someone into wiring mon

CSO Online

SolarWinds patches four critical Serv-U flaws enabling root access

Tue Feb 24 2026

SolarWinds addressed four critical Serv-U vulnerabilities that could let attackers gain root access to unpatched servers. SolarWinds released updates fixing four critical Serv-U vulnerabilities that allow remote code execution, potentially giving attackers full root access on unpatched servers. Serv-U is a file transfer server software that allows organizations to securely transfer files over networks using […]

Security Affairs

Know the red flags: Business email compromise signs to look out for

Tue Feb 24 2026

When it comes to cyber threats, business email compromise (BEC) is one of the sneakiest, most costly scams out there.

CSO Online

Cyber defense: From reactive to proactive

Tue Feb 24 2026

When systems are attacked, we should respond.

CSO Online

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

Tue Feb 24 2026

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. "Attackers can craft hidden instructions inside a...

The Hacker News

VMware Aria Operations flaws could enable remote attacks

Tue Feb 24 2026

Broadcom patched multiple VMware Aria Operations flaws, including high-severity issues that could enable remote code execution. Broadcom has released security updates to address multiple vulnerabilities affecting VMware Aria Operations. VMware Aria Operations is an IT operations management platform that helps organizations monitor and optimize virtual, cloud, and hybrid environments. It provides performance monitoring, capacity planning, […]

Security Affairs

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

Tue Feb 24 2026

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting beyond Ukraine and into entities supporting the war-torn nation. The activity, which targeted an unnamed entity involved in regional...

The Hacker News

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

Tue Feb 24 2026

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be...

The Hacker News

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Tue Feb 24 2026

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare...

The Hacker News

Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign

Tue Feb 24 2026

Arkanix Stealer surfaced in late 2025 as a short-lived info-stealer, likely built as an AI-assisted experiment and quickly abandoned. Arkanix Stealer emerged in late 2025 as a short-lived information-stealing malware promoted on dark web forums. Researchers believe it was likely created as an AI-assisted experiment, suggesting the operators were testing automated development techniques rather than […]

Security Affairs

Shai-Hulud-style NPM worm hits CI pipelines and AI coding tools

Tue Feb 24 2026

A massive Shai-Hulud-style npm supply chain worm is hitting the software ecosystem, burrowing through developer machines, CI pipelines, and AI coding tools.

CSO Online

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

Tue Feb 24 2026

The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. "The group used several...

The Hacker News

Bitcoin-Milliarden von Raubkopie-Portal im Visier der Justiz

Tue Feb 24 2026

Urheberrechtsverstöße sind ein einträglisches Geschäft.

CSO Online

Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration

Tue Feb 24 2026

Russia-linked APT28 targeted European entities with a webhook-based macro malware campaign called Operation MacroMaze. Russia-linked APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) launched Operation MacroMaze, targeting select entities in Western and Central Europe from September 2025 to January 2026. The campaign used webhook-based macro malware, leveraging simple tools and legitimate services for infrastructure and data […]

Security Affairs

Everest ransomware hits Vikor Scientific ‘s supplier, data of 140,000 patients stolen

Tue Feb 24 2026

Everest ransomware claims an attack on diagnostic firm Vikor Scientific (Vanta Diagnostics), exposing data of nearly 140,000 people. The Everest ransomware group has claimed responsibility for a cyberattack on Vikor Scientific, now operating as Vanta Diagnostics. The healthcare diagnostic firm disclosed a data breach impacting nearly 139,964 individuals, as reported by the US Department of […]

Security Affairs

It’s time to rethink CISO reporting lines

Tue Feb 24 2026

Despite inroads in the C-suite and rising prominence across the business at large, security leaders are still more likely to operate at a remove from the organization’s executive leadership when it co

CSO Online

The rise of the evasive adversary

Tue Feb 24 2026

Since the earliest days of the internet, there has never been a let-up in adversarial activity.

CSO Online

Anthropic’s Claude Code Security rollout is an industry wakeup call

Tue Feb 24 2026

When Anthropic launched a “limited research preview” of its Claude Code Security offering on Friday, Wall Street investors sent the stocks of the largest cybersecurity vendors plunging.

CSO Online

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Tue Feb 24 2026

Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve their own models. The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms...

The Hacker News

OT-Security: Warum der Blick auf Open Source lohnt

Tue Feb 24 2026

Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar.

CSO Online

Russian group uses AI to exploit weakly-protected Fortinet firewalls, says Amazon

Tue Feb 24 2026

A Russian-speaking threat actor is using commercial generative AI services to compromise hundreds of Fortinet Fortigate firewalls, warns Amazon Threat Intelligence.

CSO Online

Wormable XMRig campaign leverages BYOVD and timed kill switch for stealth

Mon Feb 23 2026

A wormable cryptojacking campaign spreads via pirated software, using BYOVD and a time-based logic bomb to deploy a custom XMRig miner. Researchers uncovered a wormable cryptojacking campaign that spreads through pirated software bundles to deploy a custom XMRig miner. The attack uses a BYOVD exploit and a time-based logic bomb to evade detection and maximize […]

Security Affairs

Romanian hacker pleads guilty to selling access to Oregon state networks

Mon Feb 23 2026

A Romanian man pleaded guilty to selling admin access to Oregon’s state network for $3,000 in Bitcoin and repeatedly accessing it to prove control. Catalin Dragomir (45) from Romania, pleaded guilty in the U.S. for selling unauthorized admin access to an Oregon state emergency management network. He gained access in June 2021, advertised it, and […]

Security Affairs

APT28 Targeted European Entities Using Webhook-Based Macro Malware

Mon Feb 23 2026

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. "The campaign relies on basic tooling and the exploitation of legitimate services...

The Hacker News

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Mon Feb 23 2026

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim...

The Hacker News

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Mon Feb 23 2026

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools...

The Hacker News

CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products

Mon Feb 23 2026

Attackers are exploiting CVE-2026-1731 in BeyondTrust RS and PRA to deploy VShell, gain persistence, move laterally, and control compromised systems. Threat actors are actively exploiting a recently disclosed critical vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). The flaw is being used to conduct a wide […]

Security Affairs