Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

26/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

26/02/2026 0 Comments 0 tags

Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

26/02/2026 0 Comments 0 tags

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is

Expert Recommends: Prepare for PQC Right Now

26/02/2026 0 Comments 0 tags

Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That,

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

26/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial

Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

26/02/2026 0 Comments 0 tags

A “coordinated developer-targeting campaign” is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. “The

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

26/02/2026 0 Comments 0 tags

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

25/02/2026 0 Comments 0 tags

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

25/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. “The

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

25/02/2026 0 Comments 0 tags

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth,