A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. […]
North Korean hackers use new macOS malware in crypto-theft attacks
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. […]
6 Actively Exploited Zero-Days Patched by Microsoft With February 2026 Updates
Microsoft’s Patch Tuesday updates fix roughly 60 vulnerabilities found in the company’s products.
The post 6 Actively Exploited Zero-Days Patched by Microsoft With February 2026 Updates appeared first on SecurityWeek.
Malicious 7-Zip site distributes installer laced with proxy tool
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user’s computer into a residential proxy node. […]
Microsoft releases Windows 10 KB5075912 extended security update
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates. […]
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
Today is Microsoft’s February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities. […]
Windows 11 KB5077181 & KB5075941 cumulative updates released
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. […]
EU Unconditionally Approves Google’s $32B Acquisition of Wiz
The European Commission’s ruling is based on extensive feedback from customers and rival cloud security and infrastructure vendors.
The post EU Unconditionally Approves Google’s $32B Acquisition of Wiz appeared first on SecurityWeek.
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme.
“These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
“These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
Patch Tuesday: Adobe Fixes 44 Vulnerabilities in Creative Apps
The company has fixed several critical vulnerabilities that can be exploited for arbitrary code execution.
The post Patch Tuesday: Adobe Fixes 44 Vulnerabilities in Creative Apps appeared first on SecurityWeek.
