Category: CyberSecurityNews

Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node
05
Jan
2026

Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node

A dangerous new malware called Kimwolf has quietly infected over 2 million devices around the world, forcing them to act…

Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files
05
Jan
2026

Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files

A critical security vulnerability has been discovered in GNU Wget2, a widely used command-line tool for downloading files from the…

Threat Group 'Crimson Collective' Allegedly Claim Breach of Largest Fiber Broadband Brightspeed
05
Jan
2026

Threat Group ‘Crimson Collective’ Allegedly Claim Breach of Largest Fiber Broadband Brightspeed

Brightspeed, one of America’s leading fiber broadband infrastructure providers, has become the latest victim of a significant cyberattack. The threat…

Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System
05
Jan
2026

Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System

A critical security advisory addressing multiple vulnerabilities discovered in the Eaton UPS Companion (EUC) software. These security flaws, if exploited,…

AI-based Red Team Toolkit for Penetration Testing With Nmap and Metasploit
05
Jan
2026

AI-based Red Team Toolkit for Penetration Testing With Nmap and Metasploit

GHOSTCREW emerges as a game-changing open-source toolkit for red teamers and penetration testers. This AI-powered assistant leverages large language models,…

Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes
05
Jan
2026

Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes

A threat actor operating under the identifier 1011 has publicly claimed to have obtained and leaked sensitive data from NordVPN’s…

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data
05
Jan
2026

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

QNAP has patched multiple security vulnerabilities in its License Center application that could allow attackers to access sensitive information or disrupt services on affected NAS devices….

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network
05
Jan
2026

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Resecurity deploys synthetic data honeypots to outsmart threat actors, turning reconnaissance into actionable intelligence. A recent operation not only trapped…

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection
03
Jan
2026

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection

The cybersecurity landscape is witnessing a rise in sophisticated malware that leverages legitimate tools to mask malicious intent. A prime…

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting
03
Jan
2026

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

A dangerous cybercrime feedback loop has emerged where stolen credentials from infostealer malware enable attackers to hijack legitimate business websites…

Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage
03
Jan
2026

Finland Arrests Two Cargo Ship Crew Members Over Undersea Cable Damage

Finnish authorities have detained all 14 crew members of a cargo vessel suspected of deliberately damaging an undersea telecommunications cable…

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware
02
Jan
2026

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware

A sophisticated threat group has intensified its campaign against organizations by leveraging the latest vulnerabilities in web applications and Internet…