Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure
Trend Micro warns of critical Apex One code execution flaws
Japanese cybersecurity software firm Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution
ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices
A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
Ravie LakshmananFeb 26, 2026Malware / Threat Intelligence A previously undocumented threat activity cluster has been attributed to an ongoing malicious
Ransomware payment rate drops to record low as attacks surge
The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significant increase
Expert Recommends: Prepare for PQC Right Now
The Hacker NewsFeb 26, 2026Encryption / Data Protection Introduction: Steal It Today, Break It in a Decade Digital evolution is
Google Disrupts Chinese Hackers Infrastructre which Breached 53 Telecom and Government Entities
A suspected Chinese state-linked hacking group has been caught running one of the most far-reaching cyber espionage operations ever uncovered
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Ravie LakshmananFeb 26, 2026Vulnerability / Network Security A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart)
Medical device maker UFP Technologies warns of data stolen in cyberattack
American manufacturer of medical devices, UFP Technologies, has disclosed that a cybersecurity incident has compromised its IT systems and data. UFP
Fake Next.js job interview tests backdoor developer’s devices
A coordinated campaign targeting software developers with job-themed lures is using malicious repositories posing as legitimate Next.js projects and technical assessment
Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications
A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
Ravie LakshmananFeb 25, 2026Cyber Espionage / Network Security Google on Wednesday disclosed that it worked with industry partners to disrupt