News

Cyber Security News
cybersecuritynews.com > silver-fox-abuses-stolen-ev-certificates

Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign

6+ hour, 26+ min ago  (234+ words) The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign. The threat actors established an extensive infrastructure network to host polished landing…...

Cyber Security News
cybersecuritynews.com > china-linked-hackers-breach-southeast-asian-military-systems

China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign

1+ day, 19+ min ago  (630+ words) A sophisticated and long-running cyber espionage campaign, tracked as'CL-STA-1087, has been quietly targeting military organizations across Southeast Asia since at least 2020. The operation, assessed with moderate confidence to be linked to a China-aligned threat actor, focuses on collecting strategic and…...

Google News
cybersecuritynews.com > linux-ransomware-pay2key-attacking-organizations-ervers > amp

Google News

1+ day, 2+ hour ago  (11+ words) Linux Ransomware Pay2Key Attacking Organizations Ervers, Virtualization Hosts, and Cloud Workloads'CyberSecurityNews...

Cyber Security News
cybersecuritynews.com > fcc-blocks-new-consumer-router > amp

FCC Banned Foreign-made Consumer Routers Over Security Risks

1+ day, 12+ hour ago  (437+ words) The Federal Communications Commission (FCC) announced a major update to its Covered List, officially prohibiting the approval of new consumer-grade network routers produced in foreign countries. This regulatory action prevents these new devices from entering the United States market by…...

Cyber Security News
cybersecuritynews.com > russian-initial-access-broker-sentenced

Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms

1+ day, 8+ hour ago  (359+ words) Aleksei Volkov, a 26-year-old Russian national, has been sentenced to 81 months in federal prison for operating as an Initial Access Broker (IAB). The attacks facilitated by Volkov resulted in more than $9 million in actual damages to victim organizations, with intended…...

Cyber Security News
cybersecuritynews.com > multiple-tp-link-vulnerabilities > amp

Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System

1+ day, 8+ hour ago  (364+ words) These flaws, which affect the Archer NX200, NX210, NX500, and NX600 models, expose devices to severe risks. The security advisory highlights four distinct vulnerabilities, each carrying a high severity rating under the CVSS v4.0 framework. The most pressing issue is an authorization bypass flaw. Because…...

Cyber Security News
cybersecuritynews.com > 30-ip-kvm-flaws-enterprise-networks

$30 IP-KVM Flaws Could Give Attackers BIOS-Level Control Across Enterprise Networks

3+ day, 9+ hour ago  (352+ words) A recent security assessment by researchers has uncovered nine severe vulnerabilities across four popular low-cost IP-KVM devices. These flaws uncovered by Eclypsium allow attackers to gain complete, BIOS-level control over connected systems, effectively bypassing all operating system security controls and…...

Cyber Security News
cybersecuritynews.com > leaknet-scales-ransomware-operations > amp

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

1+ week, 1+ day ago  (675+ words) A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month " but new evidence shows it is scaling up fast, adding new tools that most security…...

Cyber Security News
cybersecuritynews.com > attackers-abuse-court-documents-targets-with-covert-rat > amp

Attackers Abuse Court Documents, GitHub Payloads to Infect Judicial Targets With COVERT RAT

1+ week, 1+ day ago  (505+ words) A new wave of targeted attacks is quietly hitting Argentina's judicial system, using fake court documents to lure legal professionals into installing a dangerous piece of malware. The campaign, formally called Operation Covert Access, deploys a Rust-built Remote Access Trojan…...

Cyber Security News
cybersecuritynews.com > iranian-cyber-ops-maintain-us-network-footholds > amp

Iranian Cyber Ops Maintain US Network Footholds, Target Cameras for Regional Surveillance

1+ week, 2+ day ago  (617+ words) Iran's cyber operations took a sharp turn in early 2026, with state-linked threat actors quietly embedding themselves inside US and Canadian networks while also targeting internet-connected surveillance cameras across the Middle East for battlefield intelligence. The Iranian APT group MuddyWater, tied…...