Cyber Security

Cyber Security
Cyber Security

Palo Alto Networks Firewall Vulnerability Allows an Attacker to Force Firewalls into a Reboot Loop

palo-alto-networks-firewall-vulnerability-allows-an-attacker-to-force-firewalls-into-a-reboot-loop

Palo Alto Networks Firewall Vulnerability A critical denial-of-service (DoS) flaw in Palo Alto Networks’ PAN-OS software could let unauthenticated attackers crash firewalls into endless reboot cycles, potentially crippling enterprise networks. Dubbed CVE-2026-0229, the vulnerability lurks in the Advanced DNS Security (ADNS) feature. An attacker sends a maliciously crafted packet to trigger a system reboot. Repeated […]

VoidLink Framework Enables On-Demand Tool Generation with Windows Plugin Support

voidlink-framework-enables-on-demand-tool-generation-with-windows-plugin-support

A newly tracked intrusion framework called VoidLink is drawing attention for its modular design and focus on Linux systems. It behaves like an implant management framework, letting operators deploy a core implant and add capabilities as needed, which shortens the time from access to action. Recent activity has been linked to a threat actor Cisco […]

Socelars Malware Attacking Windows Systems to Steal Sensitive Business Data

socelars-malware-attacking-windows-systems-to-steal-sensitive-business-data

Socelars Malware Attacking Windows Systems A dangerous information-stealing malware called Socelars is actively targeting Windows systems to collect sensitive authentication data, with particular focus on Facebook Ads Manager accounts and session cookies. Unlike traditional malware that causes immediate system damage, Socelars operates silently in the background, turning infected machines into gateways for account takeover and […]

Microsoft Patch Tuesday February 2026 54 Vulnerabilities Fixed, Including 6 Zero-days

microsoft-patch-tuesday-february-2026-54-vulnerabilities-fixed,-including-6-zero-days

Microsoft Patch Tuesday February 2026 Microsoft released its February 2026 Patch Tuesday updates on February 10, addressing 54 vulnerabilities, including six zero-days across Windows, Office, Azure, and developer tools. The updates fix issues in products like Windows Remote Desktop Services, Microsoft Defender, Azure services, GitHub Copilot, Visual Studio Code, Microsoft Exchange, and Office apps. Severity […]

Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Nodes

hackers-weaponizing-7-zip-downloads-to-turn-your-home-computers-into-proxy-nodes

A deceptive campaign targeting unsuspecting users has emerged, using a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy nodes. The malicious operation relies on a lookalike domain, 7zip[.]com, which closely mimics the legitimate 7-zip.org website, tricking users into downloading a compromised installer that appears fully […]

AI Chat App Exposes 300 Million Messages from 25 Million Users

ai-chat-app-exposes-300-million-messages-from-25-million-users

AI Chat App Exposes Messages The popular mobile application “Chat & Ask AI” has inadvertently exposed hundreds of millions of private user conversations. The app, which boasts over 50 million users across the Google Play and Apple App stores, failed to secure its backend database, allowing unauthorized access to sensitive user data. The leak stemmed […]

Hackers Exploiting Ivanti EPMM Devices to Deploy Dormant Backdoors

hackers-exploiting-ivanti-epmm-devices-to-deploy-dormant-backdoors

Ivanti EPMM Devices Exploited Hackers are actively exploiting Ivanti Endpoint Manager Mobile (EPMM) appliances to plant “dormant” backdoors that can sit unused for days or weeks. Ivanti recently disclosed two critical EPMM flaws, CVE-2026-1281 and CVE-2026-1340, spanning authentication bypass and remote code execution in different packages (aftstore and appstore). While the packages differ, defenders face […]

New Telegram Phishing Attack Abuses Authentication Workflows to Obtain Full Authorized User Sessions

new-telegram-phishing-attack-abuses-authentication-workflows-to-obtain-full-authorized-user-sessions

A sophisticated Telegram phishing campaign has re-emerged, marking a significant evolution in how threat actors compromise user accounts. Unlike traditional credential harvesting, this operation does not rely on cloning login pages to steal passwords but instead manipulates the platform’s legitimate authentication infrastructure. By integrating directly with Telegram’s official login workflows, the attackers can bypass standard […]

Cybersecurity Weekly Newsletter Notepad++ hack, Office 0-Day, ESXi 0-day Ransomware Attacks and More

cybersecurity-weekly-newsletter-notepad++-hack,-office-0-day,-esxi-0-day-ransomware-attacks-and-more

Cybersecurity Newsletter Weekly February Welcome to this week’s pulse on the cyber threat landscape, where vulnerabilities strike fast, and defenders must move faster. Notepad++ users face a supply-chain nightmare after a malicious update; Microsoft Office’s latest 0-day is ripe for exploitation; and ESXi servers are under siege from ruthless ransomware gangs. We’ve dissected these incidents, […]