SSHStalker Linux Botnet Targets Cloud Servers with SSH Brute-Force and Kernel Exploits

Dark figure with glowing eyes keyboards amidst a cyberpunk landscape of chaos.

A newly documented Linux botnet dubbed SSHStalker is actively targeting cloud infrastructure, with a particular focus on Oracle Cloud instances. The campaign combines large-scale SSH credential brute-forcing, worm-like self-propagation and exploitation of outdated Linux kernel vulnerabilities to gain root access and establish a resilient foothold on compromised servers. New SSHStalker Linux botnet focuses on cloud … Read more

Preinstalled Malware on Used Devices: Second-Hand Electronics as a Hidden Botnet Resource

Close-up of a circuit board with a lit skull chip and a finger touching it.

Buying used laptops, smartphones, routers, or smart home gadgets is increasingly coming with an unwanted extra: preinstalled malware that silently turns the device into a botnet node for DDoS attacks and other abuse. Under risk are not only traditional computers and phones, but also home routers, IP cameras, Android TV boxes, and a wide range … Read more

Malicious VK Styles Chrome Extensions Hijack 500,000 VKontakte Accounts

Cybersecurity team analyzing VK Styles malware threat with data display.

More than 500,000 VKontakte (VK) users have been exposed to a large-scale browser malware campaign dubbed VK Styles, according to Koi Security. The attackers used seemingly harmless Chrome extensions for interface customization to gain persistent control over VK accounts, silently subscribing victims to a promoted community, resetting settings, and building an infrastructure that could easily … Read more

Mass Exposure of OpenClaw AI Agents Puts 220,000 Systems at Risk

Mystical owl on laptop amid detective-themed objects and dim lighting.

SecurityScorecard has identified a critical exposure affecting the rapidly growing OpenClaw ecosystem: more than 220,000 OpenClaw instances are reachable directly from the public internet. Given the deep level of system integration typical for such AI agents, this exposure creates a significant new attack vector for both individual users and organizations. What OpenClaw Is and Why … Read more

Critical WPvivid Backup & Migration Vulnerability (CVE-2026-1357) Enables Unauthenticated RCE on WordPress Sites

USB drive and storage device labeled "backup.zip" on a worn laptop with code on screen.

A critical security flaw in the popular WPvivid Backup & Migration plugin for WordPress enables unauthenticated remote code execution (RCE) through arbitrary file upload. More than 900,000 WordPress sites using this backup and migration tool may be exposed if specific configuration conditions are met. Overview of CVE-2026-1357 in WPvivid Backup & Migration The vulnerability has … Read more

New ClickFix macOS Attacks Exploit Claude Artifacts and Google Ads to Deliver MacSync Infostealer

Two individuals in a futuristic setting dealing with cybersecurity threats.

Security researchers have identified a new wave of ClickFix attacks targeting macOS, in which threat actors combine paid Google Ads with public Claude artifacts from Anthropic to distribute the MacSync infostealer. In one case tracked by Moonlock Lab, a single malicious Claude artifact attracted more than 15,600 views, underscoring the scale and reach of the … Read more

Offline Phishing Campaign Targets Trezor and Ledger Users via Paper Letters

Overview of Moscow’s skyline with financial documents on a ledge.

A new wave of offline phishing attacks is targeting owners of Trezor and Ledger hardware wallets. Instead of traditional scam emails, attackers are sending carefully crafted paper letters by regular mail, impersonating the security teams of these manufacturers. The objective is predictable — to trick users into revealing their seed phrases and fully compromise their … Read more

Google Gemini Misuse: How State Hackers and Cybercriminals Are Weaponizing Generative AI

Futuristic scene with a robotic head and shadowy figures interacting with technology.

Google’s Threat Intelligence Group (GTIG) has published a detailed report describing how threat actors are systematically abusing the Gemini large language model (LLM) in real-world cyber operations. According to the findings, Gemini is being leveraged across the entire attack lifecycle — from reconnaissance and social engineering to infrastructure development and data exfiltration. A particularly concerning … Read more

Apple fixes critical dyld zero-day CVE-2026-20700 in emergency security updates

Group of hackers in hoodies facing a cracked Apple logo in a cybernetic landscape.

Apple has released out-of-band security updates for iOS, iPadOS, macOS, tvOS, watchOS and visionOS to close a critical zero-day vulnerability tracked as CVE-2026-20700 in the dyld (Dynamic Link Editor) component. According to Apple, the flaw was already being leveraged in highly targeted, real-world attacks against a limited set of users and was identified by Google … Read more

RenEngine Malware Campaign: Pirated Games Used to Deliver Lumma, ACR and Vidar Stealers

** Ducks on riverbank with urban skyline and historic buildings in the background.

Security analysts from Howler Cell have documented a large-scale malware distribution campaign that weaponizes pirated games and cracked commercial software. At the core of this operation is a new loader dubbed RenEngine, embedded into modified launchers for games built on the Ren’Py engine. According to telemetry from Kaspersky, the first samples in this infection chain … Read more