Cybersecurity News
- First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groupspor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 5:35 pm
Authorities in Europe and North America have announced the dismantling of a criminal virtual private network (VPN) service used by criminal actors to obscure the origins of ransomware attacks, data theft, scanning, and denial-of-service attacks. The disruption of First VPN Service was led by France and the Netherlands, with several other nations supporting the investigation since December
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malwarepor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 4:20 pm
The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine's National Security and Defense Council) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine (CERT-UA), involves sending phishing emails to government
- Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflowspor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 11:55 am
Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a six-hour window. "Using throwaway accounts and forged author identities (build-bot, auto-ci, ci-bot, pipeline-bot), the attacker injected GitHub Actions workflows containing base64-encoded bash payloads that exfiltrate CI
- Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspectivepor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 11:38 am
1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated. The
- Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attackspor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 8:50 am
The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf. In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged with offenses related to the development and operation of the botnet. Kimwolf is assessed to be a variant of AISURU. "Kimwolf
- CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEVpor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 5:47 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-34291 (CVSS score: 9.4) - An origin validation error vulnerability in Langflow that could
- Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Accesspor info@thehackernews.com (The Hacker News) on mayo 22, 2026 at 5:36 am
Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data. Tracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints. "An attacker could exploit this vulnerability if they are able to send
- Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoorpor info@thehackernews.com (The Hacker News) on mayo 21, 2026 at 2:17 pm
Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022. "Showboat is a modular post-exploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a SOCKS5 proxy," Lumen
- ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Storiespor info@thehackernews.com (The Hacker News) on mayo 21, 2026 at 11:52 am
This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust. That is what makes it worrying. The danger is in normal things now - updates, apps, cloud buttons, support chats, trusted accounts. AI
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilitiespor info@thehackernews.com (The Hacker News) on mayo 21, 2026 at 10:55 am
Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges. "Improper link resolution before file access ('link following') in Microsoft Defender
- Netherlands seizes 800 servers of hosting firm enabling cyberattacks
Financial crime investigators in the Netherlands (FIOD) arrested two men and seized 800 servers linked to a web hosting company that enabled cyberattacks, interference operations, and disinformation campaigns. [...]
- Former US execs plead guilty to aiding tech support scammers
Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that victimized individuals worldwide. [...]
- Trend Micro warns of Apex One zero-day exploited in the wild
Japanese cybersecurity software company Trend Micro has addressed an Apex One zero-day vulnerability exploited in attacks targeting Windows systems. [...]
- Drupal: Critical SQL injection flaw now targeted in attacks
Drupal is warning that hackers are attempting to exploit a "highly critical" SQL injection vulnerability announced earlier this week. [...]
- Why Chargebacks are Just One Piece of the Fraud Puzzle
Fraud losses don't stop at chargebacks. False declines, account takeovers, and abuse also damage revenue and trust. IPQS breaks down why fraud teams need broader visibility into risk and customer impact. [...]
- Ubiquiti patches three max severity UniFi OS vulnerabilities
Ubiquiti has released security updates to patch three maximum severity vulnerabilities in UniFi OS that can be exploited by remote attackers without privileges. [...]
- US and Canada arrest and charge suspected Kimwolf botnet admin
U.S. and Canadian authorities arrested and charged a Canadian man with operating the KimWolf distributed denial-of-service (DDoS) botnet, which infected nearly two million devices worldwide. [...]
- Google accidentally exposed details of unfixed Chromium flaw
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device. [...]
- Apple blocked over $11 billion in App Store fraud in 6 years
Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone. [...]
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet
Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation. [...]
- Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload
Cloud Atlas attacks the public sector and diplomatic structures of Russia and Belarus, using ReverseSocks, SSH, and Tor for persistence in infected systems and its new tool, PowerCloud.
- How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
We explain how a flaw in ExifTool allows attackers to compromise macOS systems via a malicious image (CVE-2026-3102).
- IT threat evolution in Q1 2026. Mobile statistics
This report contains mobile threat statistics for Q1 2026, along with noteworthy discoveries and quarterly trends: new versions of SparkCat and Triada.
- IT threat evolution in Q1 2026. Non-mobile statistics
The report presents key trends and statistics on malware that targeted personal computers running Windows and macOS, as well as Internet of Things (IoT) devices, during Q1 2026.
- Kimsuky targets organizations with PebbleDash-based tools
Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster.
- State of ransomware in 2026
Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more.
- CVE-2025-68670: discovering an RCE vulnerability in xrdp
During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability.
- Exploits and vulnerabilities in Q1 2026
This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks.
- OceanLotus suspected of using PyPI to deliver ZiChatBot malware
Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT.
- Websites with an undefined trust level: avoiding the trap
We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we're sharing global statistics on untrusted site detection.
LINUX
- Boost Linux Security Using These 10 Vital Testing Tools Now
Linux admins rarely deal with one fixed system anymore. A single environment may include public-facing web apps, internal services, containers, cloud workloads, code repositories, and third-party packages pulled into production. That mix creates more places for weak points to hide.
- New Rust Tool Traur Analyzes Arch Linux AUR Packages for Hidden Risks
Most of us have pulled something from the AUR because it was faster than packaging it ourselves. You need a tool; it’s there, it builds cleanly, and the system keeps moving. No alerts. No obvious red flags. That’s usually how supply chain issues begin, not with explosions but with convenience.
- Fedora 44 vs. Linux Kernel Exploits: Inside the Move to Strengthen Linux Security Settings
If you’re running Linux systems, you know that Linux kernel security is a constant, evolving challenge. New attack surfaces emerge, and keeping up with hardening techniques can feel like a never-ending sprint.
- Fine-Tuning Security with Attack Vector Controls in Linux Kernel 6.17-rc2
Managing CPU security mitigations has always been one of those balancing acts that systems administrators live and breathe but rarely get applause for. After all, striking the right trade-off between performance and protection is easier said than done, especially when speculative execution vulnerabilities—those infamous flaws with names like Spectre and Meltdown—linger in the mix.
- Clear Linux Departs: Security-First Vision Fades with Intel’s Exit
Here’s the thing about Clear Linux OS: it was never your everyday Linux distribution. It had this razor-sharp focus on performance, security, and Intel hardware optimization, making it feel like a race car built for a very specific track. For those of us who appreciate fast, efficient systems—especially ones tailored to Intel gear—it wasn’t just another Linux distro.
- Linux 6.17 AVC Introduction: Revolutionizing CPU Security Management
Linux isn’t exactly famous for keeping things simple, especially when it comes to security. Any admin managing CPU mitigations knows how messy it can get. You’re installing patches for speculative execution vulnerabilities, tweaking system performance, and second-guessing whether disabling something could open the floodgates for another attack. It’s a delicate balancing act, and frankly, it’s exhausting. That’s where Attack Vector Controls (or AVC) comes in—a much-needed feature landing in Linux 6.17 that aims to make the process more manageable.
- Ubuntu 25.10 Questing Quokka: Important Rust Integration for Security
Anyone following the trajectory of Ubuntu over the past few years could have seen this coming: Canonical isn’t just iterating; it’s evolving. And with its 25.10 release—aptly named Questing Quokka—Ubuntu takes a decisive step in reinforcing its reputation as the go-to Linux distribution for secure, reliable environments. If you’re an admin with a sharp eye on system security or someone deeply vested in the intersection of programming trends and operational resilience, this is the release to sit up and pay attention to.
- Oracle Linux 10 Is Now Available with Unbreakable Enterprise Kernel 8.1
At long last, Oracle Linux 10 has arrived, and it’s not just another checkbox upgrade. Whether you’re running on x86_64 or aarch64 platforms, this release aims squarely at IT admins wrangling resource-heavy workloads on-prem or in the cloud. The emphasis? Security, stability, and performance.
- Rspamd 3.12 Brings Faster, More Secure Spam Filtering
Email security doesn’t just happen—it’s engineered, tweaked, and refined with every lurking threat on the horizon. Rspamd has long been a trusted tool for Linux admins fighting the never-ending deluge of spam, phishing attempts, and email-based malware.
- Fingwit: Biometric Authentication & Dynamic Security on Linux
Fingerprint scanners aren’t new, but let’s be honest—Linux’s experience with biometric authentication has historically been a mixed bag. Between a tangled web of drivers, compatibility concerns, and fussy implementations, it hasn’t necessarily been smooth terrain.
Microsoft Windows
- Netherlands seizes 800 servers of hosting firm enabling cyberattacks
Financial crime investigators in the Netherlands (FIOD) arrested two men and seized 800 servers linked to a web hosting company that enabled cyberattacks, interference operations, and disinformation campaigns. [...]
- Former US execs plead guilty to aiding tech support scammers
Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that victimized individuals worldwide. [...]
- Trend Micro warns of Apex One zero-day exploited in the wild
Japanese cybersecurity software company Trend Micro has addressed an Apex One zero-day vulnerability exploited in attacks targeting Windows systems. [...]
- Drupal: Critical SQL injection flaw now targeted in attacks
Drupal is warning that hackers are attempting to exploit a "highly critical" SQL injection vulnerability announced earlier this week. [...]
- Why Chargebacks are Just One Piece of the Fraud Puzzle
Fraud losses don't stop at chargebacks. False declines, account takeovers, and abuse also damage revenue and trust. IPQS breaks down why fraud teams need broader visibility into risk and customer impact. [...]
- Ubiquiti patches three max severity UniFi OS vulnerabilities
Ubiquiti has released security updates to patch three maximum severity vulnerabilities in UniFi OS that can be exploited by remote attackers without privileges. [...]
- US and Canada arrest and charge suspected Kimwolf botnet admin
U.S. and Canadian authorities arrested and charged a Canadian man with operating the KimWolf distributed denial-of-service (DDoS) botnet, which infected nearly two million devices worldwide. [...]
- Google accidentally exposed details of unfixed Chromium flaw
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device. [...]
- Apple blocked over $11 billion in App Store fraud in 6 years
Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone. [...]
- Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet
Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation. [...]










