Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

07/04/2026 0 Comments 0 tags

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

07/04/2026 0 Comments 0 tags

A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

07/04/2026 0 Comments 0 tags

An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. “A purpose-built Python scanner continuously

The Hidden Cost of Recurring Credential Incidents

07/04/2026 0 Comments 0 tags

When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million.

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

07/04/2026 0 Comments 0 tags

In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

07/04/2026 0 Comments 0 tags

New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

07/04/2026 0 Comments 0 tags

A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate “high-velocity” attacks and break into susceptible

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

07/04/2026 0 Comments 0 tags

Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0),

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

06/04/2026 0 Comments 0 tags

An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing,

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

06/04/2026 0 Comments 0 tags

Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet