-
Threat actors are abusing shareable ChatGPT and Grok conversations and pushing them with Google Search ads to trick macOS users into running Terminal commands that install the Atomic macOS Stealer (AMOS). This campaign shows how attackers now blend soc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has released urgent security updates to address a zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan). Assigned the identifier CVE-2026-21525, this flaw is currently being exploited in the wild, meaning attackers w…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Identified through data captured by our SSH honeypots over two months, this campaign represents a sophisticated blend of eras. It merges “old-school” Internet Relay Chat (IRC) botnet tactics from the late 2000s with modern, automated mass-c…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fortinet has issued a high-severity security advisory regarding a vulnerability in specific versions of its FortiOS operating system. The flaw, identified as CVE-2026-22153, could allow unauthorized attackers to bypass authentication mechanisms, potent…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated ransomware operation known as Cephalus has emerged as a significant cybersecurity threat since mid-2025, exploiting exposed Remote Desktop Protocol (RDP) services to breach organizations worldwide. Developed in the Go programming langua…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple high-severity vulnerabilities. These patches, detailed in the release notes for versions 18.8.4, 18.7.4, and 18.6.6, resolve fl…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A ransomware threat actor calling itself Coinbase Cartel has quickly become one to watch, not because it locks files, but because it often doesn’t. First seen in September 2025, the group claimed 14 victims in that single month and later appeared in Bi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft’s February 2026 Patch Tuesday update has arrived with critical urgency, addressing 54 security vulnerabilities across its ecosystem. This month’s release is particularly severe due to the inclusion of six zero-day vulnerabilities that are cur…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into residential proxy nodes. The counterfeit site has been operating undetected for an extended period, exp…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
React2Shell (CVE-2025-55182) is a critical, pre-auth remote code execution weakness in React Server Components that impacts multiple React versions used across the React 19 ecosystem. WXA Internet Abuse Signal Collective (WXA IASC) is inaugurating To C…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


