Category: TheHackerNews

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
12
Feb
2026

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

Ravie LakshmananFeb 12, 2026Vulnerability / Network Security A significant chunk of the exploitation attempts targeting a newly disclosed security flaw…

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
12
Feb
2026

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

Ravie LakshmananFeb 12, 2026Zero-Day / Vulnerability Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to…

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
12
Feb
2026

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In…

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
11
Feb
2026

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Ravie LakshmananFeb 11, 2026Cyber Espionage / Threat Intelligence Indian defense sector and government-aligned organizations have been targeted by multiple campaigns…

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
11
Feb
2026

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Ravie LakshmananFeb 11, 2026Patch Tuesday / Vulnerability It’s Patch Tuesday, which means a number of software vendors have released patches…

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
11
Feb
2026

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

The Hacker NewsFeb 11, 2026Identity Security / Threat Exposure Intentionally vulnerable training applications are widely used for security education, internal…

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
11
Feb
2026

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

Ravie LakshmananFeb 11, 2026Linux / Botnet Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies…

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
11
Feb
2026

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that…

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
11
Feb
2026

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from…

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
10
Feb
2026

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions…

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
10
Feb
2026

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your…

Inside the Rise of the Digital Parasite
10
Feb
2026

Inside the Rise of the Digital Parasite

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise…