New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

13/01/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

13/01/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog.

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

12/01/2026 0 Comments 0 tags

Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials.

⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

12/01/2026 0 Comments 0 tags

This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

12/01/2026 0 Comments 0 tags

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

12/01/2026 0 Comments 0 tags

Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

12/01/2026 0 Comments 0 tags

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

10/01/2026 0 Comments 0 tags

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime

10/01/2026 0 Comments 0 tags

Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called Black Axe. As part of an operation

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

09/01/2026 0 Comments 0 tags

Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as