Aggregator
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability
An unprecedented surge in exploitation attempts targeting CVE-2026-1281, a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). On February 9, 2026, Shadowserver scans revealed over 28,300 unique source IP addresses attempting to exploit the flaw, marking one of the largest coordinated attack campaigns observed against enterprise mobile management infrastructure this year. CVE-2026-1281 is a pre-authentication […]
The post Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability appeared first on Cyber Security News.
CVE-2026-0488 | SAP CRM/S4HANA up to WEBCUIF 700 Scripting Editor authorization (CNNVD-202602-1709)
CVE-2026-0486 | SAP ABAP 740/758/2008_1_710/ST-PI 2005_1_700 authorization (CNNVD-202602-1710)
CVE-2026-0485 | SAP BusinessObjects BI Platform 2025/2027/ENTERPRISE 430 Requests amplification (CNNVD-202602-1711)
CVE-2026-2258 | aardappel lobster up to 2025.4 dev/src/lobster/wfc.h WaveFunctionCollapse memory corruption (Issue 395 / CNNVD-202602-1713)
Proactive strategies for cyber resilience with Wazuh
Приготовьтесь кликать чаще: Windows вводит «мобильную» систему разрешений для ПК
Major US Debt Collection Agency Radius Global Solutions Allegedly Breached, Employee HR Data and Client Information Exposed
Не отвечайте этому «эйчару»: как фальшивая вакансия может привести к утечке гостайны
CVE-2026-21531 | Microsoft Azure AI Language Authoring deserialization
CVE-2026-21533 | Microsoft Windows up to Server 2025 Remote Desktop Services privileges management
LummaStealer infections surge after CastleLoader malware campaigns
LangGraph SQLite Store $ne 操作符访问控制绕过漏洞分析
Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware
A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has been active since 2016. This multi-functional malware combines cryptocurrency mining, credential theft, and remote-control capabilities to maintain long-term access to compromised systems. The Prometei botnet infiltrates systems by exploiting weak or default credentials via Remote Desktop Protocol (RDP). Once attackers […]
The post Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware appeared first on Cyber Security News.
Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released
A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS score of 8.3/10, affects all versions up to 0.8.30 and has been patched in version 0.8.31. The vulnerability exploits a weakness in SandboxJS’s protection mechanism. […]
The post Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released appeared first on Cyber Security News.
Январское разоблачение не помогло. Атака на цепочку поставок EmEditor переросла в долгоиграющий триллер
North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer
Cybercriminals have developed a sophisticated attack campaign that exploits user trust in artificial intelligence platforms to distribute the Atomic macOS Stealer (AMOS), marking a dangerous evolution in social engineering tactics. This new threat combines legitimate AI chatbot services from ChatGPT and Grok with paid Google advertising to lure unsuspecting Mac users into executing malicious terminal […]
The post Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer appeared first on Cyber Security News.