Aggregator
CVE-2025-56647 | farm-fe farm up to 1.7.5 missing origin validation in websockets (Issue 2168)
CVE-2026-26216 | unclecode Crawl4AI up to 0.7.x Docker API Deployment /crawl exec code injection
Ransomware Decryptor Database
Odido Telecom Suffers Cyberattack – 6.2 Million Customer Accounts Affected
Odido Telecom, a leading Dutch telecommunications provider, confirmed on February 12, 2026, that hackers accessed personal data from 6.2 million customer accounts in a major cyberattack. The breach, detected over the February 7-8 weekend, has raised alarms about phishing risks despite no disruption to services. Hackers infiltrated Odido’s customer relationship management system, downloading sensitive information […]
The post Odido Telecom Suffers Cyberattack – 6.2 Million Customer Accounts Affected appeared first on Cyber Security News.
Думали, нейросеть за вас поработает, а вы отдохнете? Оказалось, всё ровно наоборот
CISA to host industry feedback sessions on cyber incident reporting regulation
One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now.
The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared first on CyberScoop.
WordPress plugin with 900k installs vulnerable to critical RCE flaw
A hard truth in Munich: Cyber defense runs through Silicon Valley
287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Users
A massive data exfiltration operation involving 287 Chrome extensions that secretly steal browsing history from approximately 37.4 million users worldwide. According to research with alias qcontinuum1, the discovery represents roughly one percent of the global Chrome user base, highlighting a significant privacy breach affecting millions of internet users. An automated scanning system using Docker containers […]
The post 287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Users appeared first on Cyber Security News.
ORB Networks Mask Cyberattacks Using Compromised IoT Devices and SOHO Routers
Operational Relay Box networks have emerged as one of the most sophisticated tools used by threat actors to hide their cyberattacks from security teams worldwide. These obfuscated mesh networks consist of compromised Internet-of-Things devices, Small Office/Home Office routers, and Virtual Private Servers that work together to mask the true origin of malicious activities. By routing […]
The post ORB Networks Mask Cyberattacks Using Compromised IoT Devices and SOHO Routers appeared first on Cyber Security News.
Advanced Threat Detection & Proactive Cyber Defense Capabilities
In today’s rapidly evolving threat landscape, organizations must maintain continuous visibility, strong detection mechanisms, and rapid response capabilities to defend against increasingly sophisticated cyber adversaries. Our Security Operations framework demonstrates proven effectiveness in identifying, analyzing, and mitigating high-risk network threats in real time. Below are two recent case studies that highlight our proactive detection, investigative
The post Advanced Threat Detection & Proactive Cyber Defense Capabilities appeared first on Seceon Inc.
The post Advanced Threat Detection & Proactive Cyber Defense Capabilities appeared first on Security Boulevard.
Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
DragonForce Ransomware Group Expands Its Influence with Cartel-like Operations and Targeting 363 Companies Since 2023
DragonForce has established itself as a formidable entity in the cybercrime landscape, having been active since December 2023. Operating under a sophisticated Ransomware-as-a-Service (RaaS) model, the group aggressively brands itself as a “cartel” to consolidate power and influence. This strategic positioning allows them to attract a wide network of affiliates while distinguishing their operations from […]
The post DragonForce Ransomware Group Expands Its Influence with Cartel-like Operations and Targeting 363 Companies Since 2023 appeared first on Cyber Security News.
«ChatGPT, унизь меня». Готово: вы уволены, а сервер компании взломан
FTC push for age verification a ‘major landmark’ for spread of the tool
DShield Sensor Captures Self-Propagating SSH Worm Exploit Using Credential Stuffing and Multi-Stage Malware
A sophisticated self-spreading worm has emerged that can completely compromise Linux systems through SSH brute-force attacks in just four seconds. This new threat combines traditional credential stuffing techniques with modern cryptographic command verification, creating a fast-moving botnet that specifically targets devices with weak authentication mechanisms. The attack demonstrates how vulnerable systems remain when default passwords […]
The post DShield Sensor Captures Self-Propagating SSH Worm Exploit Using Credential Stuffing and Multi-Stage Malware appeared first on Cyber Security News.
AMD security advisory (AV26-124)
WorldLeaks
You must login to view this content