Category: CyberSecurityNews

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection
03
Jan
2026

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection

The cybersecurity landscape is witnessing a rise in sophisticated malware that leverages legitimate tools to mask malicious intent. A prime…

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting
03
Jan
2026

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

A dangerous cybercrime feedback loop has emerged where stolen credentials from infostealer malware enable attackers to hijack legitimate business websites…

Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage
03
Jan
2026

Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage

Finnish authorities have detained all 14 crew members of a cargo vessel suspected of deliberately damaging an undersea telecommunications cable…

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware
02
Jan
2026

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware

A sophisticated threat group has intensified its campaign against organizations by leveraging the latest vulnerabilities in web applications and Internet…

Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts
02
Jan
2026

Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts

In December 2025, the Iranian-linked hacking group Handala claimed to have fully compromised the mobile devices of two prominent Israeli…

10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability
02
Jan
2026

10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability

Over 10,000 Fortinet firewalls worldwide remain vulnerable to CVE-2020-12812, a multi-factor authentication (MFA) bypass flaw disclosed over five and a…

Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack
02
Jan
2026

Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack

Hackers have launched a sophisticated phishing campaign exploiting Google Tasks notifications to target over 3,000 organizations worldwide, primarily in the…

Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement
02
Jan
2026

Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement

A sophisticated phishing campaign is currently circulating within the Cardano community, posing significant risks to users seeking to download the…

CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product
02
Jan
2026

CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product

A critical security advisory warned of severe vulnerabilities in WHILL electric wheelchairs that could allow attackers to hijack the devices…

Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain
02
Jan
2026

Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain

Cybersecurity researchers have identified a new variant of the Shai Hulud malware that reveals important insights into how threat actors…

Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
02
Jan
2026

Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach

Cognizant Technology Solutions is facing multiple class-action lawsuits following a significant data breach at TriZetto Provider Solutions (TPS), its healthcare…

Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics
02
Jan
2026

Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics

After a decade of disappearing from the cybersecurity landscape, the Careto threat group, also known as “The Mask,” has resurfaced…