Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

08/04/2026 0 Comments 0 tags

Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

08/04/2026 0 Comments 0 tags

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

08/04/2026 0 Comments 0 tags

The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.  The

Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

08/04/2026 0 Comments 0 tags

Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

08/04/2026 0 Comments 0 tags

The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. “The threat actor’s packages were designed to impersonate

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

08/04/2026 0 Comments 0 tags

Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

07/04/2026 0 Comments 0 tags

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

07/04/2026 0 Comments 0 tags

A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

07/04/2026 0 Comments 0 tags

An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. “A purpose-built Python scanner continuously

The Hidden Cost of Recurring Credential Incidents

07/04/2026 0 Comments 0 tags

When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million.