DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

27/02/2026 0 Comments 0 tags

The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

27/02/2026 0 Comments 0 tags

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

27/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module,

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

27/02/2026 0 Comments 0 tags

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

27/02/2026 0 Comments 0 tags

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A malicious downloader staged

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

27/02/2026 0 Comments 0 tags

Meta on Thursday said it’s taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

26/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

26/02/2026 0 Comments 0 tags

Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

26/02/2026 0 Comments 0 tags

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is

Expert Recommends: Prepare for PQC Right Now

26/02/2026 0 Comments 0 tags

Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That,