AI-generated React2Shell malware infects 90-plus hostsLaura FrenchFebruary 11, 2026The malware was discovered through a Docker honeypot and is used for cryptojacking.
Ten years after the Ukraine attack, here’s what we learned about protecting OT systemsMike Carr February 9, 2026
The Trump administration’s recent OMB memo walks back important Secure-by-Design conceptsTim MackeyFebruary 6, 2026
Hackers, surprises and outer space: What we’ll see at Zero Trust World 2026Paul WagenseilJanuary 20, 2026
Security OperationsSSHStalker botnet hijacks 7,000 Linux systems using IRC and SSHSteve ZurierFebruary 10, 2026SSHStalker blends IRC control with automated SSH attacks; compromise 7K cloud-hosted Linux systems.
RansomwareSmarterMail vulnerabilities exploited in ransomware campaignsLaura FrenchFebruary 10, 2026CVE-2026-23760 and CVE-2026-24423 could both lead to RCE and are under active exploitation.
Application securityAIBOM generator finds new home at OWASP to boost AI transparencyOWASP GenAI Security Project Team February 10, 2026AIBOM Generator joins OWASP, advancing community-led AI supply chain transparency and security.
Endpoint/Device SecurityEmergency patches advised after attacks on Ivanti EPMM devicesSteve ZurierFebruary 9, 2026Exploited Ivanti EPMM RCEs hit agencies, prompting emergency patching amid fears of global spread.
Application securityAnthropic: Latest Claude model finds more than 500 vulnerabilitiesLaura FrenchFebruary 6, 2026The AI company says all bugs were validated by human researchers to weed out false positives.
Governance, Risk and ComplianceCISA gives federal agencies one year to replace outdated edge devicesSteve ZurierFebruary 6, 2026Experts agree that it’s time for the federal government replace antiquated network infrastructure.
Vulnerability ManagementGoogle patches RCE, internal database leak flaws in LookerLaura FrenchFebruary 6, 2026Researchers used a crafted Git repo and exploited a race condition to achieve RCE.
Application securityVS Code config files abused to launch RCEs via GitHub CodespacesSteve ZurierFebruary 5, 2026Experts point out that exploited VS Code presents supply chain, credential theft, and network access risks.