Malware & Ransomware

16
Feb
QR Code Phishing Turns Smartphones Into New Attack Vectors

QR Code Phishing Turns Smartphones Into New Attack Vectors

Researchers observed threat actors embedding malicious URLs in QR codes that, when scanned, direct victims to credential‑harvesting webpages or
1 min read
12
Feb
Kimwolf Botnet Hijacks I2P, Boosting Stealthy DDoS Threats

Kimwolf Botnet Hijacks I2P, Boosting Stealthy DDoS Threats

The Kimwolf botnet has started routing its command‑and‑control (C2) traffic through the I2P anonymity network. By embedding its
1 min read
12
Feb
VMware vDefend Lateral Security Boosts Zero‑Trust in Private Clouds

VMware vDefend Lateral Security Boosts Zero‑Trust in Private Clouds

VMware has introduced vDefend Lateral Security, an AI‑driven module that monitors and validates every inter‑workload communication within private
1 min read
12
Feb
Nation‑State Hijacks Notepad++ Updates, Threatening Developer Supply Chains

Nation‑State Hijacks Notepad++ Updates, Threatening Developer Supply Chains

Palo Alto Networks’ Unit 42 uncovered a supply‑chain attack on the popular Notepad++ editor, where a nation‑state actor
1 min read
12
Feb
Conpet Oil Pipeline Hit by Cyberattack, Exposing Energy Critical Infrastructure Gaps

Conpet Oil Pipeline Hit by Cyberattack, Exposing Energy Critical Infrastructure Gaps

Romania’s national oil pipeline operator, Conpet, suffered a cyber intrusion that crippled its internal IT environment and rendered its
1 min read
12
Feb
AI‑Driven Prompt RCE and 0‑Click Claude Exploit Spark New Threat Wave

AI‑Driven Prompt RCE and 0‑Click Claude Exploit Spark New Threat Wave

The latest ThreatsDay Bulletin reports a coordinated surge of AI‑powered attacks. Researchers uncovered a prompt‑injection remote code execution
1 min read
12
Feb
Amaranth-Dragon Leverages CVE‑2025‑8088 to Target Southeast Asian Networks

Amaranth-Dragon Leverages CVE‑2025‑8088 to Target Southeast Asian Networks

Checkpoint researchers have linked the state‑aligned threat group Amaranth‑Dragon to active exploitation of the newly disclosed CVE‑2025‑
1 min read
12
Feb
Kimwolf Botnet Weaponizes I2P, Flooding Anonymity Network with Massive Traffic

Kimwolf Botnet Weaponizes I2P, Flooding Anonymity Network with Massive Traffic

The Kimwolf botnet has begun abusing the I2P anonymity network’s open routing architecture to inject a torrent of unwanted
1 min read
12
Feb
Apple Issues Emergency Patch for Actively‑Exploited dyld Zero‑Day (CVE‑2026‑20700)

Apple Issues Emergency Patch for Actively‑Exploited dyld Zero‑Day (CVE‑2026‑20700)

Apple released emergency updates for iOS, macOS, iPadOS, watchOS, and tvOS that fix a critical dyld memory‑corruption flaw (CVE‑
1 min read
12
Feb
Muddled Libra Leverages AI to Automate Phishing and Cloud Intrusions

Muddled Libra Leverages AI to Automate Phishing and Cloud Intrusions

Unit42’s latest investigation uncovered that the Muddled Libra ransomware group has embedded artificial‑intelligence models into its operational playbook.
1 min read