• How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool…

    Read More

  • Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

    Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

    The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT. Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing…

    Read More

  • TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

    TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

    Cybersecurity researchers have called attention to a “massive campaign” that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The activity, observed around December 25, 2025, and described as “worm-driven,” leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers, along with the recently disclosed

    Read More

  • BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

    BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

    BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution. “BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability,” the company

    Read More

  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

    OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

    OpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem. “All skills published to ClawHub are now scanned using VirusTotal’s threat intelligence, including their new Code Insight…

    Read More

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

    German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

    Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. “The focus is on…

    Read More

  • Dexter Denied Entry to Facility Holding Detained Oregon Child and Family

    Dexter Denied Entry to Facility Holding Detained Oregon Child and Family

    Free news from the Office of Maxine Dexter: Today, Feb. 6, Congresswoman Maxine Dexter, M.D. (OR-03) was blocked from conducting oversight at the South Texas Family Residential Center in Dilley, Texas, despite providing sufficient notice.

    Read More

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to

    Read More

  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down…

    Read More

  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

    Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

    A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with…

    Read More