Skip to content
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

Ravie LakshmananFeb 11, 2026Linux / Botnet Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends… 

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied… 

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent… 

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD… 

ZAST.AI Raises M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

The Hacker NewsFeb 10, 2026Application Security / Artificial Intelligence January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse… 

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a mail server that was not… 

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

Ravie LakshmananFeb 10, 2026Data Breach / Vulnerability The Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that… 

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Ravie LakshmananFeb 10, 2026Vulnerability / Network Security Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as… 

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector. “UNC3886 had launched a deliberate,…