News

@cryptika
cryptika. com > cisa-admin-leaked-aws-govcloud-keys-on-github

CISA Admin Leaked AWS Gov Cloud Keys on Github

7+ hour, 34+ min ago  (1580+ words) In Cybersecurity News - Original News Source is krebsonsecurity. com by Blog Writer May 18, 2026 A redacted screenshot of the now-defunct "Private CISA" repository maintained by a CISA contractor. The Git Hub repository that Valadon flagged was named "Private-CISA," and it harbored…...

Symbols: cwe-77,btc-usd,eth-usd
@cryptika
cryptika. com > hackers-abuse-scheduled-tasks-to-maintain-persistence-in-frostyneighbor-attacks

Hackers Abuse Scheduled Tasks to Maintain Persistence in Frosty Neighbor Attacks

3+ day, 20+ hour ago  (1583+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 15, 2026 The group, active since at least 2016, has a long history of targeting countries neighboring Belarus, and its latest campaign shows just how far it has evolved. The…...

Symbols: d05.S0,u11.S0,z74.S0,594.S0,cyw.si,5ua.si
@cryptika
cryptika. com > microsoft-details-kazuar-malwares-modular-architecture-and-p2p-botnet-operations

Microsoft Details Kazuar Malware's Modular Architecture and P2 P Botnet Operations

3+ day, 19+ hour ago  (1582+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 15, 2026 What once started as a relatively standard backdoor has now grown into a fully modular, peer-to-peer botnet specifically engineered for long-term, covert espionage against high-value government and…...

Symbols: aic.sh,ncsc-uk
@cryptika
cryptika. com > new-malware-framework-enables-screen-control-browser-artifact-access-and-uac-bypass

New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass

4+ day, 9+ hour ago  (1593+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 14, 2026 The discovery highlights how threat actors are quietly repurposing publicly available offensive tools to carry out targeted intrusions with far less effort than before. Tenc Shell was…...

Symbols: btc-usd,eth-usd
@cryptika
cryptika. com > chinese-apt-hackers-exploit-microsoft-exchange-to-breach-energy-sector-network

Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network

4+ day, 8+ hour ago  (1581+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 14, 2026 The attack ran from late December 2025 through late February 2026 and stands as one of the most detailed Chinese APT intrusions targeting energy infrastructure in the South Caucasus…...

Symbols: filen.io
@cryptika
cryptika. com > the-gentlemen-raas-leverages-fortinet-and-cisco-edge-devices-for-initial-access

The Gentlemen Raa S Leverages Fortinet and Cisco Edge Devices for Initial Access

4+ day, 22+ hour ago  (1587+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 14, 2026 The group runs its operation through an affiliate model, advertising its platform on underground forums and inviting skilled individuals to join as partners. Affiliates take home 90% of…...

Symbols: btc-usd,nasdaq:ftnt
@cryptika
cryptika. com > hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers

Hackers Abuse CVE-2026-41940 to Take Over c Panel and WHM Servers

1+ week, 45+ min ago  (1593+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 12, 2026 Tracked as CVE-2026-41940 and bearing an apocalyptic maximum severity score of 9. 8, this critical flaw has essentially handed the keys to the kingdom directly to cybercriminals. Threat actors…...

Symbols: cwe-78
@cryptika
cryptika. com > 10-best-full-disk-encryption-tools-in-2026

10 Best Full Disk Encryption Tools in 2026

1+ week, 23+ hour ago  (1677+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 11, 2026 Full Disk Encryption (FDE) is a security feature that encrypts the entire contents of a disk drive, ensuring that all data stored on the drive is protected…...

Symbols: btc-usd,nasdaq:panw,nasdaq:ftnt,nasdaq:zs,nyse:s
@cryptika
cryptika. com > vidar-malware-targets-browser-credentials-cookies-crypto-wallets-and-system-data

Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data

1+ week, 19+ hour ago  (1581+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 11, 2026 The threat is active and capable of walking away with browser data, session cookies, cryptocurrency wallet files, and sensitive system information. Vidar was not built from scratch....

@cryptika
cryptika. com > dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released

Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges " Po C Released

1+ week, 4+ day ago  (1595+ words) In Cybersecurity News - Original News Source is cybersecuritynews. com by Blog Writer May 8, 2026 Dirty Frag belongs to the same vulnerability class as Dirty Pipe and Copy Fail (CVE-2026-31431), but targets the'frag'member of the kernel's'struct sk_buff'rather than'struct pipe_buffer. The receiver-side kernel code…...

Symbols: cwe-78