Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Vulnerable SolarWinds Web Help Desk instances were exploited in December 2025 for initial access.

The post Recent SolarWinds Flaws Potentially Exploited as Zero-Days appeared first on SecurityWeek.

SecurityWeek – ​Read More

Use multiple monitors? Why I recommend this docking station for both Windows and Mac

The Anker Prime DL7400 docking station has a whopping 14 ports, triple-display support, SD and TF card slots, and plenty of power output.

Latest news – ​Read More

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools says customers were impacted after hackers compromised a data center used for quality control testing.

The post SmarterTools Hit by Ransomware via Vulnerability in Its Own Product appeared first on SecurityWeek.

SecurityWeek – ​Read More

File your taxes with H&R Block for 25% off right now with this Presidents’ Day deal

File your own taxes with the assistance of H&R Block’s popular tax prep program at a discount right now.

Latest news – ​Read More

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT.
Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks against manufacturing, finance, and IT

The Hacker News – ​Read More

China-Linked DKnife Spyware Hijacking Internet Routers Since 2019

Cisco Talos uncovers DKnife, a China-nexus framework targeting routers and edge devices. Learn how seven stealthy implants hijack data and deliver malware via AitM attacks.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

Iran’s Digital Surveillance Machine Is Almost Complete

After more than 15 years of draconian measures, culminating in an ongoing internet shutdown, the Iranian regime seems to be staggering toward its digital surveillance endgame.

Security Latest – ​Read More

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA’s KEV Catalog

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it.

The post New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA’s KEV Catalog appeared first on SecurityWeek.

SecurityWeek – ​Read More

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

Cybersecurity researchers have called attention to a “massive campaign” that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation.
The activity, observed around December 25, 2025, and described as “worm-driven,” leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers, along with the recently disclosed

The Hacker News – ​Read More

You can unlock this secure SSD with the touch of your smartphone

The Lexar TouchLock Portable SSD uses the magic of NFC to unlock.

Latest news – ​Read More