Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure

Hackers exploit a critical React Native CLI flaw (CVE-2025-11953) to run remote commands and drop stealthy Rust malware, weeks before public disclosure. Attackers are actively exploiting a critical flaw... Read more »

Ransomware gangs focus on winning hearts and minds

Ransomware-as-a-service operations are increasingly seeking to forge connections with employees, contractors and trusted partners of their target organisations as an alternative to straight-up hacking, says NCC. Read more »

Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)

Russian state-sponsored hackers Fancy Bear (aka APT 28) are exploiting CVE-2026-21509, a Microsoft Office vulnerability for which Microsoft released an emergency fix last week. The exploitation CVE-2026-21509 allows unauthorized... Read more »

Gremlin launches Disaster Recovery Testing for zone, region, and datacenter failovers

Gremlin, the proactive reliability platform, launched Disaster Recovery Testing: a new product built to safely and efficiently test zone, region, and datacenter evacuations and failovers. These large-scale tests ensure... Read more »

Download: Tines Voice of Security 2026 report

Security teams everywhere are adopting AI. Yet manual work persists, workloads are rising, and burnout continues to climb. To understand what’s really changing, Tines surveyed 1,800+ security leaders and... Read more »

Notepad++ supply chain attack: Researchers reveal details, IoCs, targets

Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored group known for targeting organizations in Southeast Asia for... Read more »

The European offensive against encrypted phone evidence

Defendants and lawyers are demanding transparency about digital evidence from police hacking operations used in criminal prosecutions across Europe following a series of critical court judgments. Read more »

APT28 exploits Microsoft Office flaw in Operation Neusploit

Russia-linked APT28 is behind Operation Neusploit, exploiting a newly disclosed Microsoft Office vulnerability in targeted attacks. Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) is behind Operation... Read more »

Sandisk brings SPRandom to open source for large SSD testing

Enterprise storage environments already run long qualification cycles as solid-state drive capacities rise and validation teams try to mirror production workloads. Preconditioning steps now consume days of lab time... Read more »

Firefox to let users manage and block AI features

Mozilla will add a set of controls in Firefox that let users manage and block GenAI features in the desktop browser. The controls will be included in Firefox version... Read more »
Subscribe to our Newsletter