top of page

Notícias

Invasão

26 de fevereiro de 2026

Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

25 de fevereiro de 2026

ShinyHunters Claims Wynn Resorts Data Theft

Wynn Resorts confirmed unauthorized access to employee data after ShinyHunters claimed to have stolen over 800,000 records. The post ShinyHunters Claims Wynn Resorts Data Theft appeared first on eSecurity Planet.

23 de fevereiro de 2026

Global Chip Supplier Advantest Discloses Cyber Incident

Advantest is investigating a possible ransomware incident after detecting unauthorized access to its corporate network. The post Global Chip Supplier Advantest Discloses Cyber Incident appeared first on eSecurity Planet.

19 de fevereiro de 2026

French Government Says 1.2 Million Bank Accounts Exposed in Breach

The Ministry of Economy reported discovering unauthorized access to the national bank account registry FICOBA. The post French Government Says 1.2 Million Bank Accounts Exposed in Breach appeared first on SecurityWeek.

13 de fevereiro de 2026

Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches

South Korea has fined luxury fashion brands Louis Vuitton, Christian Dior Couture, and Tiffany $25 million for failing to implement adequate security measures, which facilitated unauthorized access and the exposure of data belonging to more than 5.5 million customers. [...]

11 de fevereiro de 2026

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet's control servers.

11 de fevereiro de 2026

Four Seconds to Botnet - Analyzing a Self Propagating SSH Worm with Cryptographically Signed C2 [Guest Diary], (Wed, Feb 11th)

[This is a Guest Diary by Johnathan Husch, an ISC intern as part of the SANS.edu BACS program]

11 de fevereiro de 2026

SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning

A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC bots, and mass-scanning malware. Flare researchers uncovered a previously undocumented Linux botnet dubbed SSHStalker, observed via SSH honeypots over two months. Researchers ran an SSH honeypot with weak credentials starting in early 2026 and spotted a set of intrusions unlike […]

10 de fevereiro de 2026

New Linux botnet SSHStalker uses old-school IRC for C2 comms

A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]

10 de fevereiro de 2026

New 'SSHStalker' Linux Botnet Uses Old Techniques

Estimated to have infected 7,000 systems, the botnet uses a mass-compromise pipeline, deploying various scanners and malware. The post New 'SSHStalker' Linux Botnet Uses Old Techniques appeared first on SecurityWeek.

bottom of page