SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Ravie LakshmananFeb 11, 2026Linux / Botnet Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies...
Category Added in a WPeMatico Campaign
Ravie LakshmananFeb 11, 2026Linux / Botnet Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies...
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from...
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions...
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your...
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise...
The Hacker NewsFeb 10, 2026Application Security / Artificial Intelligence January 5, 2026, Seattle, USA — ZAST.AI announced the completion of...
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance....
Ravie LakshmananFeb 10, 2026Data Breach / Vulnerability The Netherlands' Dutch Data Protection Authority (AP) and the Council for the Judiciary...
Ravie LakshmananFeb 10, 2026Vulnerability / Network Security Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that...
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus...
Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat...
Ravie LakshmananFeb 09, 2026Hacking News / Cybersecurity Cyber threats are no longer coming from just malware or exploits. They’re showing...
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles...
Ravie LakshmananFeb 09, 2026Threat Intelligence / Cyber Espionage The threat actor known as Bloody Wolf has been linked to a...
Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious...