February 2026

Court Refuses to Slice Up CiCi’s Cyber Extortion Coverage

Andrea DeField and S. Alice Weeks of Hunton Andrews Kurth write: In the rarely litigated space of cyber insurance, the Northern District of ...

Sp123 28 Feb, 2026

Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf , the wor...

Sp123 28 Feb, 2026

Inside a fake Google security check that becomes a browser RAT

A website styled to resemble a Google Account security page is distributing what may be one of the most fully featured browser-based surveil...

Sp123 27 Feb, 2026

Vulnerabilities in PluXml CMS software

CERT Polska has received a report about 3 vulnerabilities (from CVE-2026-24350 to CVE-2026-24352) found in PluXml CMS software. Introducti...

Sp123 27 Feb, 2026

Dark Web Profile: Andariel

Dark Web Profile: Andariel Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon...

Sp123 27 Feb, 2026

Driving innovation for law enforcement: Europol hosts its third Industry and Research Days

Over three days, 40 companies and eight EU-funded research projects presented cutting-edge technological solutions designed to address the e...

Sp123 27 Feb, 2026

Instagram flagged explicit messages to minors in 2018. Image-blurring arrived six years later

Meta took six years to blur explicit images on Instagram, even though internal emails show executives were aware in 2018 that minors were re...

Sp123 26 Feb, 2026

PlugX Meeting Invitation via MSBuild and GDATA

In relation to the latest variant of the PlugX RAT executed by STATICPLUGIN analyzed by IIJ-SECT, LAB52 aims to complement this information ...

Sp123 26 Feb, 2026

ANY.RUN & Splunk Enterprise: Stronger Detection, Faster Response in Your SOC

Security teams don’t lack alerts, they lack fast, reliable context for decision-making. When threat analysis and intelligence are not an int...

Sp123 26 Feb, 2026

Follow the money: cocaine trafficking network exposed through its financial trail

The investigation was led by the French National Gendarmerie, in close cooperation with the Italian Carabinieri and the Swiss Federal Office...

Sp123 26 Feb, 2026

T1497.001 System Checks in MITRE ATT&CK Explained

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 25 Feb, 2026

Turn Your SOC Into a Detection Engine: Rethinking Threat Monitoring

Threat monitoring is treated as one capability among many. Something that sits alongside incident response and threat hunting on an org char...

Sp123 25 Feb, 2026