• 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO. Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and…

    Read More

  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation of the vulnerability…

    Read More

  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process.…

    Read More

  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which…

    Read More

  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition. Elsewhere

    Read More

  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how common attack techniques work in controlled environments. The issue is not the applications themselves, but how they…

    Read More

  • Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

    Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

    Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified…

    Read More

  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported…

    Read More

  • HD 52 candidates introduce themselves, stances on issues at the Feb. 1 Wasco County Democrats forum

    HD 52 candidates introduce themselves, stances on issues at the Feb. 1 Wasco County Democrats forum

    THE DALLES — Jeff Helfrich, who represents area in the Oregon House of Representatives has filed for the senate, leaving House District 52 open for contention.

    Read More

  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme. “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent

    Read More