APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

11/02/2026 0 Comments 0 tags

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

11/02/2026 0 Comments 0 tags

It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

11/02/2026 0 Comments 0 tags

Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

11/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends stealth

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

11/02/2026 0 Comments 0 tags

Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

11/02/2026 0 Comments 0 tags

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

10/02/2026 0 Comments 0 tags

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

10/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within

ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

10/02/2026 0 Comments 0 tags

January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total

From Ransomware to Residency: Inside the Rise of the Digital Parasite

10/02/2026 0 Comments 0 tags

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around