News
Cloud logs under threat? The method that exposes attackers early
1+ mon, 3+ week ago (295+ words) Instead of treating every alert as an isolated event, the approach focuses on reading them as connected patterns. When alerts line up in a certain way, they can hint at the presence of a specific threat group. That shift, subtle…...
Beware of "I am not a robot": the malware trap that uses Google Calendar.
2+ mon, 4+ day ago (407+ words) A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious people have created a new malware campaign that uses…...
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!
2+ mon, 5+ day ago (339+ words) The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center of a new security alert: two vulnerabilities emerged in its sandbox that can lead to Remote Code Execution (RCE) on vulnerable…...
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials
2+ mon, 5+ day ago (258+ words) A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't a theoretical warning or an isolated problem: attackers have already breached networks using techniques that bypass authentication controls that many…...
Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.
2+ mon, 5+ day ago (458+ words) GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions. These tools can operate for extended periods without the need for updates on legacy hardware and embedded…...
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
2+ mon, 6+ day ago (289+ words) Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as CVE-2026-21509, affects several versions of…...
Linux: A "ghost" kernel bug discovered that had been lurking since 2020!
2+ mon, 6+ day ago (330+ words) A significant vulnerability has been discovered in the Linux kernel, hidden for years in one of the most critical architectural components of the system : the x86 page fault handling mechanism. This vulnerability emerges when the processor detects an unauthorized memory access…...
33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps
2+ mon, 6+ day ago (408+ words) 33,000 tons of iron" and an investigation where AIS and logs are cyber intelligence traps'Red Hot Cyber 33,000 tons of iron" and an investigation where AIS and logs are cyber intelligence traps A recent operation in the port of Brindisi, conducted by…...
How a simple Visual Studio Code file can become a backdoor for state-run hackers
2+ mon, 1+ week ago (393+ words) Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but full-blown compromise techniques that exploit Microsoft…...
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
2+ mon, 1+ week ago (320+ words) The underlying concept is simple in idea, but complex in implementation: converting an executable program into a visual map . This "pixel code" can then be stored inside an image or video, making it seemingly harmless to traditional scanning tools that…...