ALERT

ACTIVE THREATS: Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet  •  Payouts King ransomware uses QEMU VMs to bypass endpoint security  •  Payouts King ransomware uses QEMU VMs to bypass endpoint security  •  Every Old Vulnerability Is Now an AI Vulnerability  •  Grinex exchange blames "Western intelligence" for $13.7M crypto hack      ACTIVE THREATS: Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet  •  Payouts King ransomware uses QEMU VMs to bypass endpoint security  •  Payouts King ransomware uses QEMU VMs to bypass endpoint security  •  Every Old Vulnerability Is Now an AI Vulnerability  •  Grinex exchange blames "Western intelligence" for $13.7M crypto hack

Featured Analysis

View all →
FEATURED_STORYLIVE
🟡VulnerabilitiesHIGH

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploi

Intel Feed

Get threat alerts in your inbox

Critical vulnerabilities, breaches, and threat intel — decoded and delivered. No spam, just signal.

Unsubscribe anytime. We respect your privacy.

Latest Stories

🟡VulnerabilitiesCRITICAL

Microsoft's March 2026 Patch Tuesday: 77 Vulnerabilities Addressed, Prioritization Still Paramount

Microsoft's March 2026 Patch Tuesday delivered a comprehensive set of security updates, patching at least 77 vulnerabilities across its Windows operating systems and various software components. While this month brings a welcome absence of actively exploited zero-day flaws, a stark contrast to February's five, cybersecurity teams must still prioritize rapid deployment of critical fixes to safeguard against significant potential risks.

via Krebs on Security·
🟣MalwareMEDIUM

Enterprise Alert: Storm-2561 Deploys Trojan VPNs via SEO Poisoning to Harvest Credentials

Microsoft has uncovered a sophisticated credential theft campaign, dubbed Storm-2561, which leverages SEO poisoning to trick users into downloading malicious, digitally signed VPN clients. These deceptive applications, masquerading as legitimate enterprise software, are designed to pilfer sensitive user credentials, posing a significant threat to organizational security and data integrity.

via The Hacker News·
🟡VulnerabilitiesCRITICAL

Sophisticated Phishing Leverages Bogus VPN Clients to Steal Enterprise Credentials

A cunning new campaign by the threat actor Storm-2561 is distributing highly convincing fake enterprise VPN clients for major vendors like Ivanti, Cisco, and Fortinet. This insidious tactic aims to deceive unsuspecting corporate users into surrendering their legitimate login credentials, providing attackers with a critical foothold into organizational networks for subsequent malicious activities.

via BleepingComputer·
RansomwareHIGH

AiLock Ransomware Claims England Hockey Data Breach, Investigation Launched

England Hockey, the national governing body for field hockey, is currently investigating a significant data breach claim made by the AiLock ransomware gang, which has listed the organization as a victim on its dark web leak site. This incident underscores the escalating threat ransomware poses to diverse sectors, compelling security teams to re-evaluate their defenses against sophisticated data exfiltration and extortion tactics.

via BleepingComputer·
🔴BreachesHIGH

Canadian Retail Giant Loblaw Forces Mass Logout Following Data Breach Notification

Loblaw, one of Canada's largest retail and food service companies, has confirmed a data breach, prompting the company to automatically log out all customer accounts as a precautionary measure. This incident underscores the persistent cybersecurity challenges faced by major corporations holding vast amounts of customer data, necessitating immediate user action to re-authenticate and maintain account security.

via BleepingComputer·