• Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts

    Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts

    Cybersecurity company Huntress on Friday warned of “widespread compromise” of SonicWall SSL VPN devices to access multiple customer environments. “Threat actors are authenticating into multiple accounts rapidly across compromised devices,” it said. “The speed and scale of these attacks imply that the attackers appear to control valid credentials rather than brute-forcing.” A significant chunk of

    Read More

  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

    Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

    Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is known for deploying the Warlock and LockBit ransomware. The threat actor’s use of the security utility was documented by Sophos last month. It’s assessed that…

    Read More

  • Oregon Journalism Project: Kotek Raises Money, Drazan Keeps Mum

    Oregon Journalism Project: Kotek Raises Money, Drazan Keeps Mum

    FREE NEWS: Gov. Tina Kotek has not announced her reelection plans for 2026, but her fundraising has kicked into a higher gear, with nearly $400,000 raised since Sept. 1, giving her $1.1 million in the bank. Meanwhile, Kotek’s 2022 Republican…

    Read More

  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

    Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

    Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It’s assessed that the malware is being propagated through

    Read More

  • From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

    From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

    Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially…

    Read More

  • The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

    The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

    The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. But not all AI SOC platforms are created equal. From prompt-dependent copilots to autonomous, multi-agent systems, the…

    Read More

  • From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

    From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

    Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products. The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and

    Read More

  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

    CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

    Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle’s E-Business Suite (EBS) software since August 9, 2025, Google Threat Intelligence Group (GTIG) and Mandiant said in a new report released Thursday. “We’re still assessing the scope of this incident, but we believe it affected dozens of organizations,”…

    Read More

  • From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware

    From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware

    A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL. “The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding,…

    Read More

  • New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

    New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

    A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. “Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos…

    Read More