News
Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign
6+ hour, 26+ min ago (234+ words) The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign. The threat actors established an extensive infrastructure network to host polished landing…...
China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign
1+ day, 19+ min ago (630+ words) A sophisticated and long-running cyber espionage campaign, tracked as'CL-STA-1087, has been quietly targeting military organizations across Southeast Asia since at least 2020. The operation, assessed with moderate confidence to be linked to a China-aligned threat actor, focuses on collecting strategic and…...
Google News
1+ day, 2+ hour ago (11+ words) Linux Ransomware Pay2Key Attacking Organizations Ervers, Virtualization Hosts, and Cloud Workloads'CyberSecurityNews...
FCC Banned Foreign-made Consumer Routers Over Security Risks
1+ day, 12+ hour ago (437+ words) The Federal Communications Commission (FCC) announced a major update to its Covered List, officially prohibiting the approval of new consumer-grade network routers produced in foreign countries. This regulatory action prevents these new devices from entering the United States market by…...
Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms
1+ day, 8+ hour ago (359+ words) Aleksei Volkov, a 26-year-old Russian national, has been sentenced to 81 months in federal prison for operating as an Initial Access Broker (IAB). The attacks facilitated by Volkov resulted in more than $9 million in actual damages to victim organizations, with intended…...
Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System
1+ day, 8+ hour ago (364+ words) These flaws, which affect the Archer NX200, NX210, NX500, and NX600 models, expose devices to severe risks. The security advisory highlights four distinct vulnerabilities, each carrying a high severity rating under the CVSS v4.0 framework. The most pressing issue is an authorization bypass flaw. Because…...
$30 IP-KVM Flaws Could Give Attackers BIOS-Level Control Across Enterprise Networks
3+ day, 9+ hour ago (352+ words) A recent security assessment by researchers has uncovered nine severe vulnerabilities across four popular low-cost IP-KVM devices. These flaws uncovered by Eclypsium allow attackers to gain complete, BIOS-level control over connected systems, effectively bypassing all operating system security controls and…...
LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader
1+ week, 1+ day ago (675+ words) A ransomware group known as LeakNet has been quietly building a more dangerous attack strategy. Until recently, the group averaged about three victims per month " but new evidence shows it is scaling up fast, adding new tools that most security…...
Attackers Abuse Court Documents, GitHub Payloads to Infect Judicial Targets With COVERT RAT
1+ week, 1+ day ago (505+ words) A new wave of targeted attacks is quietly hitting Argentina's judicial system, using fake court documents to lure legal professionals into installing a dangerous piece of malware. The campaign, formally called Operation Covert Access, deploys a Rust-built Remote Access Trojan…...
Iranian Cyber Ops Maintain US Network Footholds, Target Cameras for Regional Surveillance
1+ week, 2+ day ago (617+ words) Iran's cyber operations took a sharp turn in early 2026, with state-linked threat actors quietly embedding themselves inside US and Canadian networks while also targeting internet-connected surveillance cameras across the Middle East for battlefield intelligence. The Iranian APT group MuddyWater, tied…...