News Feed
Stay informed with the latest cybersecurity news, threat intelligence, and industry updates from curated sources.
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
Read full articleNorth Korea's UNC1069 Hammers Crypto Firms With AI
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
Read full articleMicrosoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts
The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials. [...]
Read full articleCrazy ransomware gang abuses employee monitoring tool in attacks
A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support tool to maintain persistence in corporate networks, evade detection, and prepare for ransomware deployment. [...]
Read full articleGeorgia healthcare company data breach impacts more than 620,000
The company told victims in September about the breach, and said an investigation revealed hackers were in ApolloMD’s IT environment between May 22 and May 23.
Read full articlePolice arrest seller of JokerOTP MFA passcode capturing tool
The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTP phishing automation tool that can intercept one-time passwords (OTP) for hijacking accounts. [...]
Read full articleProactive strategies for cyber resilience with Wazuh
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response to strengthen proactive defense. [...]
Read full articleLummaStealer infections surge after CastleLoader malware campaigns
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. [...]
Read full articleAI Rising: Do We Know Enough About the Data Populating It?
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.
Read full articleTop Cyber Industry Defenses Spike CO2 Emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Read full articleRansomware Remains A Top 10 AI Threat In 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 11, 2026 –Read the full story in ZDNet ZDNet recently published “10 ways AI can inflict unprecedented damage in 2026,” that deserve every business leader’s attention: 1. AI-enabled malware will unleash The post Ransomware Remains A …
Read full articleMicrosoft releases Windows 11 26H1 for select and upcoming CPUs
Microsoft has announced Windows 11 26H1, but it's not for existing PCs. Instead, it will ship on devices with Snapdragon X2 processors and possibly other rumored ARM chips.w [...]
Read full articleAsia Fumbles With Throttling Back Telnet Traffic in Region
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall the region lagged in curbing Telnet traffic.
Read full articleNew Linux botnet SSHStalker uses old-school IRC for C2 comms
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
Read full articleNorth Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
Read full articleSolarWinds WHD Attacks Highlight Risks of Exposed Apps
Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.
Read full articleIn Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
Read full articleMicrosoft Patches 6 Actively Exploited Zero-Days
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
Read full articleHow to Stay on Top of Future Threats With a Cutting-Edge SOC
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
Read full articleKnowledge Base
Explore our comprehensive knowledge base with articles, guides, and resources on cybersecurity topics.
Browse ArticlesReport a Cybercrime
If you've encountered a cyber threat or crime, report it to our team for investigation and assistance.
Submit Report