North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
The North Korea-linked threat actor known as UNC1069 has been observed targeting…
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
The information technology (IT) workers associated with the Democratic People's Republic of…
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it…
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA)…
TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure
Cybersecurity researchers have called attention to a "massive campaign" that has systematically…
OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills
OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned…
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
Ravie LakshmananFeb 06, 2026Cyber Espionage / Malware A previously undocumented cyber espionage…
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für…
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and…


