Fake Zoom and Google Meet scams install Teramind: A technical deep dive
On February 24, 2026, we published an article about how a fake Zoom meeting “update” silently installs monitoring software, documenting a campaign that...
On February 24, 2026, we published an article about how a fake Zoom meeting “update” silently installs monitoring software, documenting a campaign that...
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure...
SUNNYVALE, Calif., February 26, 2026 – Proofpoint, Inc., a leading cybersecurity and compliance company, today announced that Proofpoint Collaboration Protection is now integrated with the Extended plan in AWS...
The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built...
By definition, an advanced persistent threat (APT) is a prolonged, targeted attack on a specific victim with the intention to compromise...
LokiLocker is a Ransomware-as-a-Service (Raas) that has been active since at least mid-August 2021 targeting Windows systems. The ransomware...
X (formerly Twitter) hacks tend to hit fast. One minute you’re scrolling like normal. The next, your account is posting crypto promotions,...
U.S. CISA adds Cisco SD-WAN flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 26, 2026 U.S. Cybersecurity and...
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has...
OpenClaw runs on an employee’s machine. But the access it creates lives inside Slack, Salesforce, Google Workspace, GitHub, and...
Feb 26, 2026 Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
As part of that effort, BSI conducted a comprehensive series of assessments and tests, including deep security analysis, to make sure that the security capabilities...
Ravie LakshmananFeb 26, 2026Malware / Threat Intelligence A previously undocumented threat activity cluster has been attributed to an ongoing malicious...
Ravie LakshmananFeb 26, 2026Cybersecurity / Hacking News Nothing here looks dramatic at first glance. That’s the point. Many of this...
The Hacker NewsFeb 26, 2026Encryption / Data Protection Introduction: Steal It Today, Break It in a Decade Digital evolution is...