
Security
Fake Next.js Job Interviews Target Developers with Backdoor Malware
2/26/2026

Security
Fake 7-Zip Site Turns PCs Into Residential Proxy Nodes
2/14/2026

Security
Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
2/13/2026

Security
Fake 7-Zip Website Turns Victims Into Residential Proxy Nodes
2/10/2026

Security
DKnife Linux Toolkit Hijacks Router Traffic to Spy, Deliver Malware
2/6/2026

Vulnerabilities
Ransomware Gangs Exploit ISPsystem VMs for Stealthy Attacks
2/6/2026

Security
Hackers compromise NGINX servers to redirect user traffic
2/5/2026

Cybersecurity
Initial access hackers switch to Tsundere Bot for ransomware attacks
1/29/2026

Security
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
1/22/2026

Vulnerabilities
North Korean Hackers Evolve Visual Studio Code Attack Methods
1/22/2026

Security
Russian Hackers Target Ukrainian Forces with PLUGGYAPE Malware via WhatsApp and Signal
1/14/2026

Cybersecurity
Russian Hackers Target Ukrainian Army with Charity-Themed PluggyApe Malware
1/13/2026