Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Illicit Crypto Economy Surges as Nation-States Join in the Fray

    Illicit Crypto Economy Surges as Nation-States Join in the Fray

    January 9, 2026
    Cyber News

    Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump. ​ ​ ​Read More

  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

    Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

    January 9, 2026
    Cyber News

    Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was attributed…

  • Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)

    Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)

    January 9, 2026
    Cyber News

    As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than evidence. The real challenge isn’t a lack of forecasts—it’s identifying which predictions reflect real, emerging risks and which can safely be ignored. An upcoming webinar hosted by Bitdefender aims to cut through the noise…

  • Who Benefited from the Aisuru and Kimwolf Botnets?

    Who Benefited from the Aisuru and Kimwolf Botnets?

    January 8, 2026
    Cyber News

    Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left behind by the hackers, network operators and services that appear to have benefitted from Kimwolf’s spread. On…

  • Maximum Severity HPE OneView Flaw Exploited in the Wild

    Maximum Severity HPE OneView Flaw Exploited in the Wild

    January 8, 2026
    Cyber News

    Exploitation of CVE-2025-37164 can enable remote code execution on HPE’s IT infrastructure management platform, leading to devastating consequences. ​ ​ ​Read More

  • Fake AI Chrome Extensions Steal 900K Users’ Data

    Fake AI Chrome Extensions Steal 900K Users’ Data

    January 8, 2026
    Cyber News

    Threat actors ripped off a legitimate AI-powered Chrome extension in order to harvest ChatGPT and DeepSeek data before sending it to a C2 server. ​ ​ ​Read More

  • ChatGPT’s Memory Feature Supercharges Prompt Injection

    ChatGPT’s Memory Feature Supercharges Prompt Injection

    January 8, 2026
    Cyber News

    The “ZombieAgent” exploit makes use of ChatGPT’s long-term memory and advanced capabilities. ​ ​ ​Read More

  • WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging

    WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging

    January 8, 2026
    Cyber News

    Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil. The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit. “The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact…

  • Attackers Exploit Zero-Day in End-of-Life D-Link Routers

    Attackers Exploit Zero-Day in End-of-Life D-Link Routers

    January 7, 2026
    Cyber News

    Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands. ​ ​ ​Read More

  • Phishers Exploit Office 365 Users Who Let Their Guard Down

    Phishers Exploit Office 365 Users Who Let Their Guard Down

    January 7, 2026
    Cyber News

    Microsoft said that Office 365 tenants with weak configurations and who don’t have strict anti-spoofing protection enabled are especially vulnerable. ​ ​ ​Read More

Previous Page
1 … 8 9 10 11 12 … 62
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn