Aggregator
KONNI Adopts AI to Generate PowerShell Backdoors
Key Findings: Introduction Check Point Research (CPR) identified an ongoing phishing campaign that we associate with KONNI, a North Korean–linked threat actor active since at least 2014. KONNI is best known for targeting organizations and individuals in South Korea, with a focus on diplomatic channels, international relations, NGOs, academia, and government. The group typically relies […]
The post KONNI Adopts AI to Generate PowerShell Backdoors appeared first on Check Point Research.
Ревёрс-инжиниринг на службе хакеров. Как простой патч безопасности «развязал» преступникам руки
Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code
A critical remote code injection vulnerability in Vivotek legacy firmware that enables unauthenticated attackers to execute arbitrary commands with root privileges. The vulnerability, tracked as CVE-2026-22755, affects dozens of camera models and poses significant risks to organizations relying on legacy surveillance infrastructure. The vulnerability exists in the upload_map.cgi script, where user-supplied filenames are processed through an unsanitized snprintf() function […]
The post Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code appeared first on Cyber Security News.
AL26-002 -Vulnerability affecting GNU Inetutils Telnetd - CVE-2026-24061
Energy sector orgs targeted with AiTM phishing campaign
Organizations in the energy sector are being targeted with phishing emails aimed at compromising enterprise accounts, Microsoft warns. The attack campaign The attacks started with phishing emails with “NEW PROPOSAL – NDA” in the subject line, coming from a compromised email address belonging to a trusted organization. The subject line and the SharePoint link URL included in the email are unlikely to raise suspicion with users, and will often dodge traditional email‑centric detection mechanisms. Users … More →
The post Energy sector orgs targeted with AiTM phishing campaign appeared first on Help Net Security.
Вход «в один клик» – и на одного взломанного больше. Как ваша лень помогает мошенникам воровать данные
Jordan used Cellebrite phone-hacking tools against activists critical of Gaza war, report finds
RALord
You must login to view this content
FortiGate Firewalls Hacked in Automated Attacks to Steal Configuration Data
A new cluster of automated malicious activity targeting FortiGate firewall devices. Beginning January 15, 2026, threat actors have been observed executing unauthorized configuration changes, establishing persistence through generic accounts, and exfiltrating sensitive firewall configuration data. This campaign echoes a December 2025 incident involving malicious SSO logins shortly after Fortinet disclosed critical vulnerabilities CVE-2025-59718 and CVE-2025-59719. […]
The post FortiGate Firewalls Hacked in Automated Attacks to Steal Configuration Data appeared first on Cyber Security News.
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
VoidLink Malware Puts Cloud Systems on High Alert With Custom Built Attacks
«ТЗ на согласование» и фальшивый «Яндекс»: Как устроена новая волна кибератак на компании в РФ
Hackers exploit 29 zero-days on second day of Pwn2Own Automotive
CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after confirming active exploitation of a zero-day remote code execution (RCE) vulnerability in multiple Cisco Unified Communications products. Tracked as CVE-2026-20045, the flaw enables code injection attacks that grant attackers user-level access to the underlying OS, followed by full root privilege escalation. Added […]
The post CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks appeared first on Cyber Security News.
Malicious PyPI Package Mimic as Popular Sympy-Dev to Attack Millions of Users
A new malicious package on the Python Package Index (PyPI), named sympy-dev, has been caught impersonating the widely used SymPy library to deliver cryptomining malware. SymPy is a popular symbolic mathematics library that sees tens of millions of downloads every month, making it an attractive target for attackers looking to abuse developer trust and widespread adoption. […]
The post Malicious PyPI Package Mimic as Popular Sympy-Dev to Attack Millions of Users appeared first on Cyber Security News.
INC
You must login to view this content
LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords
What Is Student-Centered Learning? A Practical Guide for New Teachers
Many new teachers step into classrooms that still reflect traditional, teacher-centered models. These classrooms often place the teacher at the front, the curriculum at the center, and students in the role of listeners. Today’s learners live, think, and communicate differently, so they need more than memorization and recall. They need learning environments that value curiosity, ...
The post What Is Student-Centered Learning? A Practical Guide for New Teachers appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.
The post What Is Student-Centered Learning? A Practical Guide for New Teachers appeared first on Security Boulevard.