Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots…
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic…
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and…
FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Jan 09, 2026Ravie LakshmananMobile Security / Email Security The U.S. Federal Bureau…
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known…
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Jan 09, 2026Ravie LakshmananEmail Security / Threat Intelligence Russian state-sponsored threat actors…
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to…
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence A China-nexus threat actor known…
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
Jan 08, 2026Ravie LakshmananMalware / Financial Crime Cybersecurity researchers have disclosed details…


