Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Ravie LakshmananFeb 12, 2026Cyber Espionage / Artificial Intelligence Google on Thursday said…
83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
Ravie LakshmananFeb 12, 2026Vulnerability / Network Security A significant chunk of the…
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Cybersecurity researchers have discovered what they said is the first known malicious…
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Ravie LakshmananFeb 11, 2026Cyber Espionage / Threat Intelligence Indian defense sector and…
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
The North Korea-linked threat actor known as UNC1069 has been observed targeting…
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
The information technology (IT) workers associated with the Democratic People's Republic of…
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it…
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA)…
TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure
Cybersecurity researchers have called attention to a "massive campaign" that has systematically…


