Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the…
Technology
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as MuddyWater has been…
Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
Jan 10, 2026Ravie LakshmananCybercrime / Financial Crime Europol on Friday announced the arrest of 34 individuals…
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised…
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Jan 09, 2026Ravie LakshmananEmail Security / Threat Intelligence Russian state-sponsored threat actors have been linked to…
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
Jan 09, 2026Ravie LakshmananGovernment / Vulnerability Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…
The Hype We Can Ignore (And the Risks We Can’t)
Jan 09, 2026The Hacker NewsArtificial Intelligence / Enterprise Security As organizations plan for 2026, cybersecurity predictions…
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
Jan 09, 2026Ravie LakshmananVulnerability / Endpoint Security Trend Micro has released security updates to address multiple…
FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Jan 09, 2026Ravie LakshmananMobile Security / Email Security The U.S. Federal Bureau of Investigation (FBI) on…
Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Jan 08, 2026Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have disclosed details of multiple critical-severity security…