The cyber threat landscape is witnessing the resurgence of the Phorpiex botnet, a long-standing malware-as-a-service platform active for over a decade. In a recent high-volume campaign, attackers are distributing phishing emails with the deceptive subject line “Your Document.” These emails…
Windows Error Reporting Service Vulnerability Let Attackers Elevate Privileges – PoC Released
A critical security flaw in Windows Error Reporting Service has been discovered, allowing attackers with standard user access to escalate their privileges to SYSTEM-level control. CVE-2026-20817, patched by Microsoft in January 2026, represents a significant threat to Windows environments due…
VoidLink Linux C2 Highlights LLM-Generated Malware with Multi-Cloud and Kernel-Level Stealth
A sophisticated Linux malware framework known as VoidLink has emerged as a concerning example of AI-assisted threat development, combining advanced multi-cloud targeting capabilities with kernel-level stealth mechanisms. The malware represents a new generation of cyber threats where large language models…
Threat Actors Exploiting React2Shell Vulnerability Using AI-Generated Malware
A fully AI-generated malware campaign actively exploiting the “React2Shell” vulnerability, detected within Darktrace’s “CloudyPots” global honeypot network, the intrusion highlights a critical shift in cybercrime: the weaponization of Large Language Models (LLMs) to lower the barrier of entry for effective…
How safe are kids using social media? We did the groundwork
Our research found that mainstream platforms often protect children well—until curiosity or the wrong settings get in the way. This article has been indexed from Malwarebytes Read the original article: How safe are kids using social media? We did the…
Singapore spent 11 months booting China-linked snoops out of telco networks
Operation Cyber Guardian involved 100-plus staff across government and industry Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country’s largest cyber defense operation to date.… This…
New Mobile Spyware ZeroDayRAT Targets Android and iOS
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access This article has been indexed from www.infosecurity-magazine.com Read the original article: New Mobile Spyware ZeroDayRAT Targets Android and iOS
“Digital Parasite” Warning as Attackers Favor Stealth for Extortion
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden This article has been indexed from www.infosecurity-magazine.com Read the original article: “Digital Parasite” Warning as Attackers Favor Stealth for Extortion
China-Linked DKnife Targets Routers
Cybersecurity researchers have uncovered DKnife, a sophisticated gateway-monitoring and adversary-in-the-middle framework utilized by Chinese threat actors since 2019 to target edge devices. This article has been indexed from CyberMaterial Read the original article: China-Linked DKnife Targets Routers
Germany Warns of Signal Phishing Attacks
German security agencies have issued a joint warning regarding a sophisticated phishing campaign on Signal that targets high-ranking political, military, and journalistic figures. This article has been indexed from CyberMaterial Read the original article: Germany Warns of Signal Phishing Attacks
Spain Science Ministry Shuts Systems
The Spanish Ministry of Science has partially suspended its information technology systems and administrative services following a significant technical incident. This article has been indexed from CyberMaterial Read the original article: Spain Science Ministry Shuts Systems
Norway Discloses Salt Typhoon Target
Norway’s domestic security agency has confirmed that the Chinese state-sponsored group Salt Typhoon successfully compromised various network devices within the country. This article has been indexed from CyberMaterial Read the original article: Norway Discloses Salt Typhoon Target
Hacker Attack Hits Uffizi Museum
The Uffizi Gallery in Florence successfully maintained public operations and visitor services after a weekend cyberattack targeted its internal administrative servers and staff email systems. This article has been indexed from CyberMaterial Read the original article: Hacker Attack Hits Uffizi…
IT Security News Hourly Summary 2026-02-10 15h : 11 posts
11 posts were published in the last hour 13:32 : Man tricked hundreds of women into handing over Snapchat security codes 13:32 : New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices 13:32 : How the Supreme Court’s…
Man tricked hundreds of women into handing over Snapchat security codes
Hacked Snapchat accounts and secret filming with smart glasses, this week served two reminders of how women’s privacy is still being violated. This article has been indexed from Malwarebytes Read the original article: Man tricked hundreds of women into handing…
New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices
Available via Telegram, researchers warn ZeroDayRAT is a ‘complete mobile compromise toolkit’ comparable to kits normally requiring nation-state resources to develop. The post New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices appeared first on SecurityWeek. This article…
How the Supreme Court’s “Third Party” Subpoena Doctrine Empowers Governments to Seize Sensitive Information Without Your Knowledge
This article examines the widespread collection of personal data and the legal challenges individuals face from third-party subpoenas. It discusses key court rulings on government access to personal information and highlights the complexities of data privacy in the digital age.…
TeamPCP Turns Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform
TeamPCP, operating under aliases including PCPcat, ShellForce, and DeadCatx3, emerged in late 2025 as a cloud-native cybercrime operation that transforms misconfigured infrastructure into automated attack platforms. Unlike traditional malware groups, this threat actor doesn’t break into systems they walk through…
SAP Security Patch Day Fixes Critical Code Injection Flaw in SAP CRM and S/4HANA
SAP said the February 10, 2026 Patch Day delivered fixes across multiple SAP products and urged customers to apply patches with priority via the Support Portal to protect their SAP landscape. The highest-risk item highlighted this month is CVE-2026-0488, described…
React2Shell Vulnerability Exploited in the Wild, Analysts Warn
React2Shell (CVE-2025-55182) is a critical, pre-auth remote code execution weakness in React Server Components that impacts multiple React versions used across the React 19 ecosystem. WXA Internet Abuse Signal Collective (WXA IASC) is inaugurating To Cache A Predator, a threat research…
New ‘SSHStalker’ Linux Botnet Uses Old Techniques
Estimated to have infected 7,000 systems, the botnet uses a mass-compromise pipeline, deploying various scanners and malware. The post New ‘SSHStalker’ Linux Botnet Uses Old Techniques appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Flickr Reveals Data Breach Originating From Third Party Systems
A security incident affecting the user data of popular photo sharing platform Flickr has been confirmed to be the result of a compromise within a third-party service integrated into Flickr’s operation, rather than the company’s core infrastructure. According to…
Singapore Telecoms Hit by China-Linked Cyber Espionage
Singapore’s cyber watchdog has disclosed that an advanced cyber espionage group — UNC3886, with which APT10 and Red October have been linked — was behind attacks that targeted the four major telecom operators last year. The affected companies were Singtel,…
Cybersecurity Breaches Emerge as top Business Risk for Indian Companies
Cybersecurity breaches and attacks have become the leading threat to business performance for Indian companies, with 51% of senior executives identifying them as their primary risk, according to a new survey released by FICCI and EY. The FICCI-EY Risk…