Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part…
Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part…
The dramatic progress of AI and its impact on both the economy and society at large dominated the conversation throughout the World Economic Forum at…
Data accessed in October 2025 went undetected until February, affecting subscribers across the newsletter platform with no evidence of misuse yet identified. Substack disclosed a…
Threat Actors Hacking NGINX Servers A sophisticated campaign in which threat actors are stealthily compromising NGINX servers to redirect web traffic to malicious destinations. The…
The inner workings of LockBit 5.0, a sophisticated ransomware variant targeting Windows, Linux, and VMware ESXi systems simultaneously. This latest version represents a significant evolution…
Attackers are leaning on a new EDR killer malware that can shut down 59 widely used endpoint security products by misusing a kernel driver that…
Mountain View, California, pulled the plug on its entire license plate reader camera network this week. It discovered that Flock Safety, which ran the system,…
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of…
As much as half of all the code produced at Alphabet, the parent company of Google, is being generated by artificial intelligence (AI) coding agents.…
Hackers stole email addresses and other personal information from 1.4 million accounts after breaching the systems of automated investment platform Betterment in January. Betterment provides a mix…
Microsoft Add Sysmon Windows 11 A major upgrade has been announced to enhance capabilities for cybersecurity defenders and threat hunters in the Windows ecosystem. With…
A sophisticated social engineering campaign that weaponizes fake voicemail notifications to trick victims into installing remote access tools. The attack begins when victims receive communications…