Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate…
Category: EN
New Wave of Odyssey Stealer Actively Targeting macOS Users
A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems. This fresh wave of cyber threats has caught the attention of security experts due to its rapid spread and enhanced stealth capabilities.…
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
Cracked game installers are again being used as a delivery channel for credential theft, but the latest wave adds an unusual twist: the malicious code hides behind a Ren’Py game launcher. The loader, now tracked as RenEngine, arrives bundled with…
China-Nexus Hackers Hijacking Linux-Based Devices to Manipulate Traffic and Deploy Malware
A sophisticated surveillance and attack framework dubbed “DKnife” has recently emerged, posing a significant threat to network security. Attributed to China-nexus threat actors, this malicious toolset specifically targets Linux-based routers and edge devices. By compromising these critical network gateways, attackers…
CISA Orders Removal of Active Network Edge Devices to Reduce Security Risks
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks. This directive, developed in coordination with the Office of Management and Budget (OMB), addresses…
Apple Pay phish uses fake support calls to steal payment details
This Apple Pay phishing campaign is designed to funnel victims into fake Apple Support calls, where scammers steal payment details. This article has been indexed from Malwarebytes Read the original article: Apple Pay phish uses fake support calls to steal…
State-backed phishing attacks targeting military officials and journalists on Signal
German security authorities are warning that a likely state-backed hacking group is engaged in attempts at phishing senior political figures, military officials, diplomats, and investigative journalists across Germany and Europe via Signal. The authorities also noted that while these attacks…
AI Hijacks AWS Cloud in 8 Minutes via Exposed Keys
An AI-assisted cyberattack hijacked a company’s AWS cloud infrastructure in just eight minutes after attackers discovered exposed test credentials in a public S3 bucket, demonstrating how configuration errors can fuel lightning-fast breaches in the era of automated threats. This…
Poland’s energy control systems were breached through exposed VPN access
On 29 December 2025, coordinated cyberattacks unfolded across Poland’s critical infrastructure, targeting energy and industrial organizations. The attackers struck numerous wind and solar farms, a private manufacturing company, and a heat and power (CHP) plant, but failed to negatively affect…
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over…
Ask Me Anything Cyber : Inside the Mind of a Hacker
With Pratik Giri, CEO of Sherlocked Security This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber : Inside the Mind of a Hacker
Ask Me Anything Cyber: Love, Lies and AI
Have questions about AI-powered romance scams and online deception? This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber: Love, Lies and AI
Cybersecurity Events 2026
Discover leading global technology and cybersecurity events in 2026, showcasing the full spectrum of cyber topics for professionals at every stage of their career. This article has been indexed from CyberMaterial Read the original article: Cybersecurity Events 2026
Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack
A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on Indian government, defense, and educational sectors, the group has now expanded its scope to target India’s growing startup ecosystem. This…
Threat Actors Leverage Hugging Face to Spread Android Malware at Scale
Initially appearing as a routine security warning for mobile devices, this warning has evolved into a carefully engineered malware distribution pipeline. Researchers at Bitdefender have identified an Android campaign utilizing counterfeit security applications that serve as the first stage…
17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware
Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: 17% of 3rd-Party…
CISA orders US federal agencies to replace unsupported edge devices
The US Cybersecurity and Infrastructure Security Agency (CISA) issued a new binding operational directive aimed at reducing a long-standing cyber risk across federal networks: outdated “edge devices” that are not longer supported by vendors and aren’t receiving timely security updates.…
Bulletproof Hosting Providers Exploit Legitimate ISPs to Power Cybercrime Servers
A surprising link between legitimate IT software and major cybercriminal operations. While investigating attacks by the “WantToCry” ransomware gang, analysts noticed that the attackers were using virtual machines (VMs) with identical, computer names (hostnames) like WIN-J9D866ESIJ2 and WIN-LIVFRVQFMKO. These names were not random.…
Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise
Modern web applications frequently introduce unforeseen attack surfaces through seemingly harmless features designed for user engagement, such as newsletter signups, contact forms, and password resets. While individual vulnerabilities might appear manageable in isolation, sophisticated adversaries increasingly chain these minor flaws…
Flickr Confirms Data Breach – 35 million Users Data at Risk
Flickr has disclosed a potential data breach stemming from a vulnerability in a third-party email service provider’s system. The incident, reported on February 5, 2026, may have exposed data for some of its 35 million monthly users, though the exact…