Stay on top of cybersecurity news with curated feeds spanning tools, breaches, ransomware, CTF events, exploits, and more.
đź“° News
-
Fancy Bear Hackers Exploiting Microsoft Zero-Day Vulnerability to Deploy Backdoors and Email Stealers
Latest Newsroom — Tue, 10 Feb 2026 10:21:37 +0000Fancy Bear Hackers Exploiting Microsoft Zero-Day Vulnerability to Deploy Backdoors and Email Stealers Read more Published Date: Feb 10, 2026 (38 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-21509
-
Axios Vulnerability Let Attackers Triggers DoS Condition and Crash Node.js Servers
Latest Newsroom — Tue, 10 Feb 2026 10:11:34 +0000Axios Vulnerability Let Attackers Triggers DoS Condition and Crash Node.js Servers Read more Published Date: Feb 10, 2026 (48 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-25639
-
30-Year-Old Libpng Vulnerability Exposes Millions of Systems to Code Execution Attacks
Latest Newsroom — Tue, 10 Feb 2026 10:01:11 +000030-Year-Old Libpng Vulnerability Exposes Millions of Systems to Code Execution Attacks Read more Published Date: Feb 10, 2026 (59 minutes ago) Vulnerabilities has been mentioned in this article.
-
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
Latest Newsroom — Tue, 10 Feb 2026 08:22:00 +0000Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data Read more Published Date: Feb 10, 2026 (2 hours, 38 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-1340 CVE-2026-1281 CVE-2026-24858 CVE-2026-21509 CVE-2025-8088
-
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
The Hacker News — Tue, 10 Feb 2026 13:52:00 +0530The Netherlands' Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the...
-
Fugitive behind $73M 'pig butchering' scheme gets 20 years in prison
BleepingComputer — Tue, 10 Feb 2026 03:17:54 -0500A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or romance baiting) that defrauded victims of more than $73 million. [...]
-
Critical SAP Alert: Code Injection (CVSS 9.9) Exposes S/4HANA Databases
Latest Newsroom — Tue, 10 Feb 2026 07:47:22 +0000Critical SAP Alert: Code Injection (CVSS 9.9) Exposes S/4HANA Databases Read more Published Date: Feb 10, 2026 (3 hours, 13 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-23689 CVE-2026-23687 CVE-2026-0509 CVE-2026-0508 CVE-2026-0490 CVE-2026-0488 CVE-2026-0485 CVE-2026-24858...
-
Inside the Operations of Inception Framework: A Decade of Stealth, Espionage, and Global Targeting
Brandefense — Tue, 10 Feb 2026 07:36:49 +0000Inception Framework is a long-running Russian-speaking cyberespionage group focused on government, diplomatic, and defense targets using stealthy spearphishing and cloud-based intrusion techniques. The post Inside the Operations of Inception Framework: A Decade of Stealth, Espionage, and Global Targeting appeared...
-
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
The Hacker News — Tue, 10 Feb 2026 10:08:00 +0530Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. "An improper neutralization of special elements used...
-
Chinese cyberspies breach Singapore's four largest telcos
BleepingComputer — Mon, 09 Feb 2026 17:47:53 -0500The Chinese threat actor tracked as UNC3886 breached Singapore's four largest telecommunication service providers, Singtel, StarHub, M1, and Simba, at least once last year. [...]
-
Hackers exploit SolarWinds WHD flaws to deploy DFIR tool in attacks
BleepingComputer — Mon, 09 Feb 2026 15:28:15 -0500Hackers are now exploiting SolarWinds Web Help Desk (WHD) vulnerabilities to gain code execution rights on exposed systems and deploy legitimate tools, including the Velociraptor forensics tools, for persistence and remote control. [...]
-
Hackers breach SmarterTools network using flaw in its own software
BleepingComputer — Mon, 09 Feb 2026 14:08:58 -0500SmarterTools confirmed last week that the Warlock ransomware gang breached its network after compromising an email system, but did not impact business applications or account data. [...]
-
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
The Hacker News — Mon, 09 Feb 2026 22:31:00 +0530The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector. "UNC3886 had launched a deliberate, targeted, and well-planned campaign against Singapore's telecommunications sector," CSA said. "All four of...
-
Password guessing without AI: How attackers build targeted wordlists
BleepingComputer — Mon, 09 Feb 2026 10:01:11 -0500Attackers don't need AI to crack passwords, they build targeted wordlists from an organization's own public language. This article explains how tools like CeWL turn websites into high-success password guesses and why complexity rules alone fall short. [...]
-
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
The Hacker News — Mon, 09 Feb 2026 20:12:00 +0530Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. That said, the Microsoft Defender Security...
-
⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More
The Hacker News — Mon, 09 Feb 2026 18:29:00 +0530Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths. A clear pattern this week:...
-
APT27
Brandefense — Sat, 31 Jan 2026 11:06:00 +0000APT27 is a long-running China-aligned cyber espionage group targeting governments, defense contractors, and critical infrastructure through stealthy, high-impact operations. The post APT27 appeared first on Brandefense.
-
APT3 (BORON): A Pioneering China-Aligned Cyber Espionage Group
Brandefense — Fri, 30 Jan 2026 09:35:02 +0000APT3 (BORON) is one of the earliest China-aligned APT groups, known for exploit-driven espionage campaigns targeting defense, advanced manufacturing, and government sectors. The post APT3 (BORON): A Pioneering China-Aligned Cyber Espionage Group appeared first on Brandefense.
-
FIN11 (DEV-0950 / Lace Tempest / TA505 / TEMP.Warlock / UNC902): A 1000-Word Intelligence
Brandefense — Thu, 29 Jan 2026 09:24:56 +0000FIN11 is a globally active, financially motivated cybercrime group known for large-scale phishing campaigns, malware distribution, and ransomware ecosystem enablement. The post FIN11 (DEV-0950 / Lace Tempest / TA505 / TEMP.Warlock / UNC902): A 1000-Word Intelligence appeared first on Brandefense.
-
From Shadow IT to Shadow AI: Clawdbot (Moltbot/Openclaw) and the Rise of Unmanaged Agent Gateways
Brandefense — Wed, 28 Jan 2026 09:09:39 +0000Shadow AI is emerging as the next evolution of Shadow IT. This analysis reveals how misconfigured Clawdbot agent gateways expose LLM keys, corporate data, and integration tokens—creating a silent but critical attack surface. The post From Shadow IT to Shadow AI: Clawdbot (Moltbot/Openclaw) and the Rise of Unmanaged...
-
User Scanner: Scan a username across multiple social, developer, gaming and creator platforms to see if it’s available
OSINT - Dark Web Informer — Thu, 11 Dec 2025 20:06:04 GMTUser Scanner: Scan a username across multiple social, developer, gaming and creator platforms to see if it’s available
-
GitHub: Threat Actor Usernames Scrape
OSINT - Dark Web Informer — Thu, 11 Dec 2025 19:14:53 GMTGitHub: Threat Actor Usernames Scrape
-
WebSift: An Open-Source OSINT Tool for Web-Based Threat Hunting
OSINT - Dark Web Informer — Wed, 03 Dec 2025 13:47:00 GMTWebSift: An Open-Source OSINT Tool for Web-Based Threat Hunting
-
Scilla: Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
OSINT - Dark Web Informer — Tue, 05 Aug 2025 17:19:27 GMTScilla: Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
-
OSGINT: OSINT tool to find informations about a github user (email2username, username2email, creation date ...)
OSINT - Dark Web Informer — Sat, 02 Aug 2025 20:17:14 GMTOSGINT: OSINT tool to find informations about a github user (email2username, username2email, creation date ...)