Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Jan 09, 2026Ravie LakshmananEmail Security / Threat Intelligence Russian state-sponsored threat actors…
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to…
The Hype We Can Ignore (And the Risks We Can’t)
Jan 09, 2026The Hacker NewsArtificial Intelligence / Enterprise Security As organizations plan…
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence A China-nexus threat actor known…
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
Jan 08, 2026Ravie LakshmananMalware / Financial Crime Cybersecurity researchers have disclosed details…
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
Jan 08, 2026Ravie LakshmananPrivacy / Artificial Intelligence Artificial intelligence (AI) company OpenAI…
Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
Jan 07, 2026The Hacker NewsThreat Detection / Endpoint Security Security teams are…
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
Jan 07, 2026Ravie LakshmananVulnerability / Automation Cybersecurity researchers have disclosed details of…
Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
Jan 07, 2026Ravie LakshmananNetwork Security / Vulnerability A newly discovered critical security…


