APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

03/02/2026 0 Comments 0 tags

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

03/02/2026 0 Comments 0 tags

Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. “It provides a single

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

03/02/2026 0 Comments 0 tags

A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

02/02/2026 0 Comments 0 tags

A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks.

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

02/02/2026 0 Comments 0 tags

A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue,

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

02/02/2026 0 Comments 0 tags

Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

02/02/2026 0 Comments 0 tags

Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a

Securing the Mid-Market Across the Complete Threat Lifecycle

02/02/2026 0 Comments 0 tags

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

02/02/2026 0 Comments 0 tags

The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead. “The attack involved [an] infrastructure-level compromise that allowed

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

02/02/2026 0 Comments 0 tags

The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and