Author: Cybernoz

Police arrest seller of JokerOTP MFA passcode capturing tool
11
Feb
2026

Police arrest seller of JokerOTP MFA passcode capturing tool

The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTP phishing automation tool that…

RU-APT-ChainReaver-L Hijacks Trusted Websites and GitHub Repos in Massive Cross-Platform Supply Chain Campaign
11
Feb
2026

RU-APT-ChainReaver-L Hijacks Trusted Websites and GitHub Repos in Massive Cross-Platform Supply Chain Campaign

A sophisticated cyber threat has emerged, targeting users across multiple operating systems through compromised mirror websites and GitHub repositories. The…

Critical SandboxJS Vulnerability Allows Remote Host Takeover
11
Feb
2026

Critical SandboxJS Vulnerability Allows Remote Host Takeover

SandboxJS Vulnerability PoC Released A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute…

Cyber Resilience
11
Feb
2026

Proactive strategies for cyber resilience with Wazuh

Cyber resilience involves the ability to anticipate threats, withstand active attacks, respond quickly to incidents, and recover operations with minimal…

Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability
11
Feb
2026

Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability

Ivanti EPMM 0-day Vulnerability Exploited An unprecedented surge in exploitation attempts targeting CVE-2026-1281, a critical vulnerability in Ivanti Endpoint Manager…

London Assembly member: Police should halt facial-recognition technology use
11
Feb
2026

London Assembly member: Police should halt facial-recognition technology use

The Metropolitan Police’s rapid “unchecked” expansion of live facial-recognition (LFR) technology is taking place without clear legal authority and minimal…

Extortion attacks on the rise as hackers prioritize supply-chain weaknesses
11
Feb
2026

Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

LummaStealer infections surge after CastleLoader malware campaigns
11
Feb
2026

LummaStealer infections surge after CastleLoader malware campaigns

A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader…

Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware
11
Feb
2026

Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware

Prometei Botnet Attacking Windows Server A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has…

CBP Signs Clearview AI Deal to Use Face Recognition for ‘Tactical Targeting’
11
Feb
2026

CBP Signs Clearview AI Deal to Use Face Recognition for ‘Tactical Targeting’

United States Customs and Border Protection plans to spend $225,000 for a year of access to Clearview AI, a face…

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
11
Feb
2026

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Ravie LakshmananFeb 11, 2026Cyber Espionage / Threat Intelligence Indian defense sector and government-aligned organizations have been targeted by multiple campaigns…

UK government commits to Loan Charge settlement reforms in wake of independent review into policy
11
Feb
2026

UK government datacentre planning decisions queried over environmental oversight admission

Permission for the development, dubbed the West London Technology Park (WLTP) by its developers Greystoke, was granted by the government…