Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

23/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. “Analysis of the

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

23/02/2026 0 Comments 0 tags

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public

How Exposed Endpoints Increase Risk Across LLM Infrastructure

23/02/2026 0 Comments 0 tags

As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

23/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

23/02/2026 0 Comments 0 tags

The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA)

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

21/02/2026 0 Comments 0 tags

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

21/02/2026 0 Comments 0 tags

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

21/02/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

21/02/2026 0 Comments 0 tags

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches. The

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

20/02/2026 0 Comments 0 tags

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious