(Adobe Stock) SSHStalker botnet hijacks 7,000 Linux systems using IRC and SSHSteve ZurierFebruary 10, 2026SSHStalker blends IRC control with automated SSH attacks; compromise 7K cloud-hosted Linux systems.
Ten years after the Ukraine attack, here’s what we learned about protecting OT systemsMike Carr February 9, 2026
The Trump administration’s recent OMB memo walks back important Secure-by-Design conceptsTim MackeyFebruary 6, 2026
Ransomware encryption to regain traction amid weakening data exfiltration tacticsSC StaffFebruary 10, 2026
Hackers, surprises and outer space: What we’ll see at Zero Trust World 2026Paul WagenseilJanuary 20, 2026
RansomwareSmarterMail vulnerabilities exploited in ransomware campaignsLaura FrenchFebruary 10, 2026CVE-2026-23760 and CVE-2026-24423 could both lead to RCE and are under active exploitation.
Application securityAIBOM generator finds new home at OWASP to boost AI transparencyOWASP GenAI Security Project Team February 10, 2026AIBOM Generator joins OWASP, advancing community-led AI supply chain transparency and security.
Endpoint/Device SecurityEmergency patches advised after attacks on Ivanti EPMM devicesSteve ZurierFebruary 9, 2026Exploited Ivanti EPMM RCEs hit agencies, prompting emergency patching amid fears of global spread.
Application securityAnthropic: Latest Claude model finds more than 500 vulnerabilitiesLaura FrenchFebruary 6, 2026The AI company says all bugs were validated by human researchers to weed out false positives.
Governance, Risk and ComplianceCISA gives federal agencies one year to replace outdated edge devicesSteve ZurierFebruary 6, 2026Experts agree that it’s time for the federal government replace antiquated network infrastructure.
Vulnerability ManagementGoogle patches RCE, internal database leak flaws in LookerLaura FrenchFebruary 6, 2026Researchers used a crafted Git repo and exploited a race condition to achieve RCE.
Application securityVS Code config files abused to launch RCEs via GitHub CodespacesSteve ZurierFebruary 5, 2026Experts point out that exploited VS Code presents supply chain, credential theft, and network access risks.
Threat ManagementMore than 10,000 IPs hijacked by SystemBC botnetLaura FrenchFebruary 5, 2026Researchers identified continued development of the botnet despite “Operation Endgame” disruption.