AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
A Russian-speaking, financially motivated threat actor has been observed taking advantage of…
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
Ravie LakshmananFeb 20, 2026Vulnerability / Cyber Attack Threat actors have been observed…
Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
Ravie LakshmananFeb 18, 2026Network Security / Enterprise Security Cybersecurity researchers have disclosed…
How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
The Hacker NewsFeb 17, 2026Cloud Security / Digital Forensics Cloud attacks move…
83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
Ravie LakshmananFeb 12, 2026Vulnerability / Network Security A significant chunk of the…
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it…
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA)…
How Samsung Knox Helps Stop Your Network Security Breach
As you know, enterprise network security has undergone significant evolution over the…
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and…


