• Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

    Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

    Meta on Thursday said it’s taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers’ methods of payment have been suspended, related accounts have been disabled, and the website domain names used to pull…

    Read More

  • Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

    Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

    Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain,” Qrator Labs said in a report shared with The

    Read More

  • UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

    UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

    A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor. “Dohdoor utilizes…

    Read More

  • Expert Recommends: Prepare for PQC Right Now

    Expert Recommends: Prepare for PQC Right Now

    Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extortion generated funding for a complex and highly professional criminal ecosystem. The…

    Read More

  • Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

    Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

    A “coordinated developer-targeting campaign” is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. “The activity aligns with a broader cluster of threats that use job-themed lures to blend into routine developer workflows and increase the likelihood of code

    Read More

  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

    Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

    A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain

    Read More

  • Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

    Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

    Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. “This prolific, elusive actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,”

    Read More

  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

    Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

    Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. “The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing

    Read More

  • SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

    SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

    The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief. The group is said to be offering anywhere between…

    Read More

  • Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

    Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

    Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications.

    Read More