SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

11/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends stealth

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

11/02/2026 0 Comments 0 tags

Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

11/02/2026 0 Comments 0 tags

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

10/02/2026 0 Comments 0 tags

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

10/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within

ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

10/02/2026 0 Comments 0 tags

January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total

From Ransomware to Residency: Inside the Rise of the Digital Parasite

10/02/2026 0 Comments 0 tags

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

10/02/2026 0 Comments 0 tags

SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

10/02/2026 0 Comments 0 tags

The Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

10/02/2026 0 Comments 0 tags

Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has