Archives: News
News articles and updates
DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
A supply chain attack has tainted official installers for DAEMON Tools software, delivering malware to users who downloaded from the company’s legitimate website. Security firm Kaspersky identified the compromise, noting that the affected installers carry digital signatures from DAEMON Tools developers. This incident exposes users to risks from trusted sources, with no confirmed number of...
Yet Another Way to Bypass Google Chrome's Encryption Protection
Developers behind the VoidStealer Trojan discovered a method to circumvent Google Chrome’s App-Bound Encryption feature on May 6, 2026. This technique allows the malware to access encrypted data stored in the browser, exposing sensitive user information to theft. The finding came from analysis shared by cybersecurity researchers tracking infostealer campaigns. Bypass Method Details The VoidStealer...
Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
Hackers have targeted Windows users through Microsoft Phone Link, a tool that connects PCs to Android smartphones. Attackers deploy CloudZ RAT malware along with a new Pheno plug-in to access text messages and one-time passwords (OTPs). These actions allow bypassing two-factor authentication (2FA) in stealthy operations detected recently. Enterprises face the highest risks as attackers...
Middle East Cyber Battle Field Broadens — Especially in UAE
The United Arab Emirates has become a primary target in an expanding cyber conflict in the Middle East, with breach attempts tripling in recent weeks. Critical infrastructure sectors, including energy and transportation, report the highest volume of incidents amid the ongoing war with Iran. Officials confirmed the sharp increase on May 6, 2026, based on...
Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
The UC Berkeley Center for Long-Term Cybersecurity (CLTC) provides tools and support to schools, local governments, and non-profits. These organizations face a rising number of cyberattacks. Under-resourced groups often lack resources to protect their systems. CLTC steps in to help them build defenses against these threats. What Happened Cyberattacks on small organizations have increased in...
Autonomous Offensive Security Firm XBOW Raises $35 Million
XBOW, a firm focused on autonomous offensive security, raised $35 million. The funding serves as an extension to its prior Series C round. This capital infusion supports the company’s efforts in developing systems for automated security testing and offensive operations. The announcement appeared on SecurityWeek, confirming the raise occurred before May 7, 2026. XBOW operates...
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
Ivanti Endpoint Manager Mobile (EPMM) users face risks from limited real-world attacks exploiting a high-severity vulnerability. The issue, tracked as CVE-2026-6973, enables remote code execution and grants administrative access to affected systems. Ivanti confirmed the flaw’s exploitation on May 6, 2026, urging immediate patching. What Happened Ivanti detected the vulnerability in EPMM versions prior to...
The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed
NetworkUstad — Security researchers report that a common server configuration leaves organizations open to backdoor attacks, with many teams failing to address the issue despite known risks as of May 6, 2026. Experts point to misconfigured administrative interfaces on web servers as the primary vulnerability. Attackers scan for exposed management portals, such as default admin...
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
ScarCruft, a North Korean hacking group, has compromised a gaming platform to distribute BirdCall malware targeting Android and Windows devices. Security researchers detected the operation, which uses the platform to deliver the payload through malicious updates and downloads. Attack Details The hackers breached the gaming platform’s servers, injecting malicious code into legitimate apps and update...
Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API
Security researchers have confirmed active exploitation of a remote code execution vulnerability in Weaver E-cology software, tracked as CVE-2026-22679. Attackers are targeting the product’s debug API, allowing unauthorized code execution on affected systems as of early May 2026. Vulnerability Details The flaw resides in the debug API of Weaver E-cology, an enterprise application used for...