Latest NEWS

US and Canada arrest and charge suspected Kimwolf botnet admin
U.S. and Canadian authorities arrested and charged a Canadian man with operating the KimWolf distributed denial-of-service (DDoS) botnet, which infected nearly two million devices worldwide. [...]
24 May 2026
From:
Sergiu Gatlan [BleepingComputer]

A Russian speaker and jailbroken Gemini went on a hacking spree and emptied at least one MAGA victim's crypto wallets
Hey, Gemini, how much can we earn from one pump-and-dump cycle?
24 May 2026
From:
[www.theregister.com - Articles]

The Virtual OS Museum opens its doors
A massive compilation of historic OSes and the emulators to run them
24 May 2026
From:
[www.theregister.com - Articles]

UK MPs slam digital ID rollout as a 'fiasco' after botched launch
Government's 'rushed' plans damaged public confidence before ministers had even explained how the system would work
24 May 2026
From:
[www.theregister.com - Articles]

Google accidentally exposed details of unfixed Chromium flaw
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device. [...]
24 May 2026
From:
Bill Toulas [BleepingComputer]

CVE-2025-68670: discovering an RCE vulnerability in xrdp
During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability.
24 May 2026
From:
Denis Skvortsov, Dmitry Shmoylov [Securelist]

Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective
1 Introduction
This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated. The
24 May 2026
From:
info@thehackernews.com (The Hacker News) [The Hacker News]

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload
Cloud Atlas attacks the public sector and diplomatic structures of Russia and Belarus, using ReverseSocks, SSH, and Tor for persistence in infected systems and its new tool, PowerCloud.
24 May 2026
From:
Kaspersky [Securelist]


.jpg)



