Cybersecurity

Introduction Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set...
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while...

FBI takes notorious RAMP ransomware forum offline

The FBI has seized control of RAMP, a notorious cybercrime online forum that bragged to be "the only place ransomware allowed."Both the forum's presence...

This month in security with Tony Anscombe – January 2026 edition

The year got off to a busy start, with January offering an early snapshot of the challenges that (not just)...

Weekly Update 488

It's the discussion about the reaction of some people in the UK regarding their impending social media ban for under 16s that bugged me...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in...

eScan supply chain attack: what you should know

UPD 30.01.2026: Added technical details about the attack chain and more IoCs. On January 20, a supply chain attack has occurred, with the infected software...

Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?

I was looking for possible exploitation of CVE-2026-21962, a recently patched WebLogic vulnerability. While looking for related exploit attempts in our data, I came...

Who Operates the Badbox 2.0 Botnet? – Krebs on Security

The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating...

ChatGPT gets ads, pets get AI therapists, and everyone’s wrong about LLMs • Graham Cluley

In episode 85 of The AI Fix, Graham discovers that Silicon Valley has the solution to...

MoD – Darknet Diaries

Full Transcript Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of...

Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and...

Weekly Update 487

I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get...

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited...

Recent articles