A surge of destructive wiper attacks is now threatening organizations across both Israel and the United … Handala Expands Destructive Cyber Operations Beyond Israeli TargetsRead more
Author: Rakesh
Global Police Smash Massive SocksEscort Fraud Network
A major international law enforcement operation has successfully dismantled the SocksEscort malicious proxy network, a sprawling … Global Police Smash Massive SocksEscort Fraud NetworkRead more
TA453 and TA473 Drive Iran War‑Themed Phishing Across the Middle East
Since the Iran war began in late February 2026, researchers have observed a sharp escalation in … TA453 and TA473 Drive Iran War‑Themed Phishing Across the Middle EastRead more
Loblaw Data Breach: Threat Actor Gains Access to Internal IT Network and Customer Data
Loblaw Companies Limited—Canada’s largest food and pharmacy retailer—has confirmed a data breach affecting portions of its … Loblaw Data Breach: Threat Actor Gains Access to Internal IT Network and Customer DataRead more
LangSmith Vulnerability: CVE‑2026‑25750 and How to Prevent Account Takeover
LangSmith, the AI observability platform behind many enterprise LLM stacks, ingests over one billion events per … LangSmith Vulnerability: CVE‑2026‑25750 and How to Prevent Account TakeoverRead more
Dohdoor Malware: Multi‑Stage DoH Backdoor Targeting U.S. Schools & Healthcare
A new threat cluster, UAT‑10027, is actively deploying a previously unseen backdoor called Dohdoor against U.S. … Dohdoor Malware: Multi‑Stage DoH Backdoor Targeting U.S. Schools & HealthcareRead more
Fake Zoom & Google Meet Phishing Attacks Deploy Teramind Spyware
A highly sophisticated phishing campaign is impersonating Zoom and Google Meet to install Teramind, a legitimate … Fake Zoom & Google Meet Phishing Attacks Deploy Teramind SpywareRead more
Metasploit’s February 2026 Update Delivers Powerful New Exploits and Evasion Tools
Rapid7 has released one of the most impactful Metasploit Framework updates in recent years, delivering seven … Metasploit’s February 2026 Update Delivers Powerful New Exploits and Evasion ToolsRead more
WebDAV Malware Delivery: How Hackers Exploit Windows File Explorer
Phishing is no longer confined to the browser. A fast‑growing tactic—WebDAV malware delivery—leverages legacy behavior in … WebDAV Malware Delivery: How Hackers Exploit Windows File ExplorerRead more
ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise Defenses
Phishing has evolved beyond look‑alike domains and typo‑squats. Recent research exposes ARPA TLD phishing, where threat … ARPA TLD Phishing: How IPv6 Tunnels Evade Enterprise DefensesRead more