-
Microsoft’s February 2026 Patch Tuesday update has arrived with critical urgency, addressing 54 security vulnerabilities across its ecosystem. This month’s release is particularly severe due to the inclusion of six zero-day vulnerabilities that are cur…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into residential proxy nodes. The counterfeit site has been operating undetected for an extended period, exp…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
React2Shell (CVE-2025-55182) is a critical, pre-auth remote code execution weakness in React Server Components that impacts multiple React versions used across the React 19 ecosystem. WXA Internet Abuse Signal Collective (WXA IASC) is inaugurating To C…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
SAP said the February 10, 2026 Patch Day delivered fixes across multiple SAP products and urged customers to apply patches with priority via the Support Portal to protect their SAP landscape. The highest-risk item highlighted this month is CVE-2026-048…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
TeamPCP, operating under aliases including PCPcat, ShellForce, and DeadCatx3, emerged in late 2025 as a cloud-native cybercrime operation that transforms misconfigured infrastructure into automated attack platforms. Unlike traditional malware groups, t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers are tracking Socelars, an information-stealing Trojan aimed at Windows users that focuses on quietly harvesting browser-based access rather than damaging files. The malware is designed to collect authenticated session data and othe…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Critical infrastructure worldwide faces mounting threats from sophisticated, state-sponsored “espionage ecosystems.” These well-funded organizations deploy various tools designed to disrupt essential services and gather intelligence. Some l…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated tech support scam campaign has emerged, exploiting malicious advertisements on Bing search results to redirect victims to fraudulent websites hosted on Microsoft’s Azure Blob Storage platform. The attack, first detected on Februar…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean threat actor UNC1069 has escalated attacks against the cryptocurrency and decentralized finance (DeFi) sector using sophisticated AI-powered social engineering tactics and seven distinct malware families, according to a recent Mandiant inv…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
VoidLink represents a concerning evolution in malware development: a sophisticated Linux command-and-control framework that shows clear signs of being built with AI assistance. This Linux malware operates as a modular implant designed for long-term acc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


