FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today — February 11th 2026Your RSS feeds

Posting AI-generated caricatures on social media is risky, infosec killjoys warn

The more you share online, the more you open yourself to social engineering

If you've seen the viral AI work pic trend where people are asking ChatGPT to "create a caricature of me and my job based on everything you know about me" and sharing it to social, you might think it's harmless. You'd be wrong.…

Roku lets anyone watch local news for free: How to find your NBC, ABC, and CBS stations

The Roku Channel has hundreds of free live channels, including your local news affiliates.

Get a free iPhone 17, Galaxy S25, or Pixel 10 during Verizon's Small Business Days sale - here's how

Right now at Verizon, small business owners can take advantage of great deals like free iPhone 17s, Ring camera bundles, and discounts on phone and internet plans.

Eero's new backup device keeps you online when your ISP fails - here's how it works

If you struggle with internet outages, this new Eero device automatically switches your home network to 4G.

Stop using ChatGPT on factory settings: 7 tweaks I use to make it a pro tool

I'm a ChatGPT power user, and these are the top settings tweaks I rely on to help me get more out of my AI sessions.

CBP Signs Clearview AI Deal to Use Face Recognition for ‘Tactical Targeting’

US Border Patrol intelligence units will gain access to a face recognition tool built on billions of images scraped from the internet.

Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet’s control servers.

Kimwolf is a botnet that surfaced in late 2025 and quickly infected millions of systems, turning poorly secured IoT devices like TV streaming boxes, digital picture frames and routers into relays for malicious traffic and abnormally large distributed denial-of-service (DDoS) attacks.

I2P is a decentralized, privacy-focused network that allows people to communicate and share information anonymously.

“It works by routing data through multiple encrypted layers across volunteer-operated nodes, hiding both the sender’s and receiver’s locations,” the I2P website explains. “The result is a secure, censorship-resistant network designed for private websites, messaging, and data sharing.”

On February 3, I2P users began complaining on the organization’s GitHub page about tens of thousands of routers suddenly overwhelming the network, preventing existing users from communicating with legitimate nodes. Users reported a rapidly increasing number of new routers joining the network that were unable to transmit data, and that the mass influx of new systems had overwhelmed the network to the point where users could no longer connect.

I2P users complaining about service disruptions from a rapidly increasing number of routers suddenly swamping the network.

When one I2P user asked whether the network was under attack, another user replied, “Looks like it. My physical router freezes when the number of connections exceeds 60,000.”

A graph shared by I2P developers showing a marked drop in successful connections on the I2P network around the time the Kimwolf botnet started trying to use the network for fallback communications.

The same day that I2P users began noticing the outages, the individuals in control of Kimwolf posted to their Discord channel that they had accidentally disrupted I2P after attempting to join 700,000 Kimwolf-infected bots as nodes on the network.

The Kimwolf botmaster openly discusses what they are doing with the botnet in a Discord channel with my name on it.

Although Kimwolf is known as a potent weapon for launching DDoS attacks, the outages caused this week by some portion of the botnet attempting to join I2P are what’s known as a “Sybil attack,” a threat in peer-to-peer networks where a single entity can disrupt the system by creating, controlling, and operating a large number of fake, pseudonymous identities.

Indeed, the number of Kimwolf-infected routers that tried to join I2P this past week was many times the network’s normal size. I2P’s Wikipedia page says the network consists of roughly 55,000 computers distributed throughout the world, with each participant acting as both a router (to relay traffic) and a client.

However, Lance James, founder of the New York City based cybersecurity consultancy Unit 221B and the original founder of I2P, told KrebsOnSecurity the entire I2P network now consists of between 15,000 and 20,000 devices on any given day.

An I2P user posted this graph on Feb. 10, showing tens of thousands of routers — mostly from the United States — suddenly attempting to join the network.

Benjamin Brundage is founder of Synthient, a startup that tracks proxy services and was the first to document Kimwolf’s unique spreading techniques. Brundage said the Kimwolf operator(s) have been trying to build a command and control network that can’t easily be taken down by security companies and network operators that are working together to combat the spread of the botnet.

Brundage said the people in control of Kimwolf have been experimenting with using I2P and a similar anonymity network — Tor — as a backup command and control network, although there have been no reports of widespread disruptions in the Tor network recently.

“I don’t think their goal is to take I2P down,” he said. “It’s more they’re looking for an alternative to keep the botnet stable in the face of takedown attempts.”

The Kimwolf botnet created challenges for Cloudflare late last year when it began instructing millions of infected devices to use Cloudflare’s domain name system (DNS) settings, causing control domains associated with Kimwolf to repeatedly usurp AmazonAppleGoogle and Microsoft in Cloudflare’s public ranking of the most frequently requested websites.

James said the I2P network is still operating at about half of its normal capacity, and that a new release is rolling out which should bring some stability improvements over the next week for users.

Meanwhile, Brundage said the good news is Kimwolf’s overlords appear to have quite recently alienated some of their more competent developers and operators, leading to a rookie mistake this past week that caused the botnet’s overall numbers to drop by more than 600,000 infected systems.

“It seems like they’re just testing stuff, like running experiments in production,” he said. “But the botnet’s numbers are dropping significantly now, and they don’t seem to know what they’re doing.”

Were telcos tipped off to *that* ancient Telnet bug? Cyber pros say the signs stack up

Curious port filtering and traffic patterns suggest advisories weren’t the earliest warning signals sent

Telcos likely received advance warning about January's critical Telnet vulnerability before its public disclosure, according to threat intelligence biz GreyNoise.…

Microsoft's latest update patches six zero-days and two critical flaws - but is it another buggy mess?

This month's update not only squashes several bugs but continues to refresh Secure Boot certificates to protect you against bootkit malware.

Amazon's Big Spring Sale: Dates and everything we know so far

Amazon's annual spring sale is expected to return soon. Here's everything we know so far.

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often

Grab this 75-inch Insignia QLED TV for less than $500 at Best Buy

Looking to upgrade your home theater on a tight budget? Right now during Best Buy's Presidents' Day sale, you can save $250 on the 75-inch Insignia QF Series QLED TV which brings the price to just $400.

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition. Elsewhere

Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

Attackers using social engineering to exploit business processes, rather than tunnelling in via tech

Exclusive When fraudsters go after people's paychecks, "every employee on earth becomes a target," according to Binary Defense security sleuth John Dwyer.…

Notepad's new Markdown powers served with a side of remote code execution

Smug faces across all those who opposed the WordPad-ification of Microsoft's humble text editor

Just months after Microsoft added Markdown support to Notepad, researchers have found the feature can be abused to achieve remote code execution (RCE).…

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

By: Unknown
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how common attack techniques work in controlled environments. The issue is not the applications themselves, but how they are often

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified as privilege escalation, followed by remote code

[webapps] motionEye 0.43.1b4 - RCE

motionEye 0.43.1b4 - RCE

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of

Legacy systems blamed as ministers promise no repeat of Afghan breach

UK government grilled over progress made to prevent a second life-threatening leak

Legacy IT issues are hampering key technical measures designed to prevent highly sensitive data leaks, UK government officials say.…

[local] glibc 2.38 - Buffer Overflow

glibc 2.38 - Buffer Overflow

[remote] Windows 10.0.17763.7009 - spoofing vulnerability

Windows 10.0.17763.7009 - spoofing vulnerability

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated

Taxing times: Top IRS scams to look out for in 2026

It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.

I took apart a 9,000,000mAh power bank from eBay to learn the truth - here's what's inside

I often get asked about cheap power banks with hard-to-believe claims. Well, I bought one and tested it. Here's my buying advice.

Can you trust LastPass in 2026? Inside the multimillion-dollar quest to rebuild its security culture

After a string of high-profile breaches, the password manager's new CEO says security is now at the 'very heart' of what it does.

Samsung confirms Galaxy S26 preorder deal for $900 off ahead of February Unpacked

Samsung's newest hardware will be unveiled on February 25, and you can already score a discount with this preorder reservation.

You can fix most Windows 11 issues by double checking these 4 settings first

If you're having trouble with Windows 11, look to this short list of the four best things you can do to enhance your PC's performance.

Microsoft's Valentine's gift to admins: 6 exploited zero-day fixes

Roses are red, violets are blue ... now get patching

What better way to say I love you than with an update? Attackers exploited a whopping six Microsoft bugs as zero-days prior to Redmond releasing software fixes on February's Patch Tuesday.…

Yesterday — February 10th 2026Your RSS feeds

Patch Tuesday, February 2026 Edition

Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild.

Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quietly bypass Windows protections and run attacker-controlled content without warning or consent dialogs. CVE-2026-21510 affects all currently supported versions of Windows.

The zero-day flaw CVE-2026-21513 is a security bypass bug targeting MSHTML, the proprietary engine of the default Web browser in Windows. CVE-2026-21514 is a related security feature bypass in Microsoft Word.

The zero-day CVE-2026-21533 allows local attackers to elevate their user privileges to “SYSTEM” level access in Windows Remote Desktop Services. CVE-2026-21519 is a zero-day elevation of privilege flaw in the Desktop Window Manager (DWM), a key component of Windows that organizes windows on a user’s screen. Microsoft fixed a different zero-day in DWM just last month.

The sixth zero-day is CVE-2026-21525, a potentially disruptive denial-of-service vulnerability in the Windows Remote Access Connection Manager, the service responsible for maintaining VPN connections to corporate networks.

Chris Goettl at Ivanti reminds us Microsoft has issued several out-of-band security updates since January’s Patch Tuesday. On January 17, Microsoft pushed a fix that resolved a credential prompt failure when attempting remote desktop or remote application connections. On January 26, Microsoft patched a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office.

Kev Breen at Immersive notes that this month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.

Breen said the AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, or tricking the AI agent into doing something it shouldn’t — like executing malicious code or commands.

“Developers are high-value targets for threat actors, as they often have access to sensitive data such as API keys and secrets that function as keys to critical infrastructure, including privileged AWS or Azure API keys,” Breen said. “When organizations enable developers and automation pipelines to use LLMs and agentic AI, a malicious prompt can have significant impact. This does not mean organizations should stop using AI. It does mean developers should understand the risks, teams should clearly identify which systems and workflows have access to AI agents, and least-privilege principles should be applied to limit the blast radius if developer secrets are compromised.”

The SANS Internet Storm Center has a clickable breakdown of each individual fix this month from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on askwoody.com, which often has the skinny on wonky updates. Please don’t neglect to back up your data if it has been a while since you’ve done that, and feel free to sound off in the comments if you experience problems installing any of these fixes.

These Windows 11 PCs are getting a free Bluetooth upgrade - here's how to use it properly

Both your laptop and hearing device must be compatible with Bluetooth LE Audio to use the latest connectivity feature.

You can tell Google Search to remove your personal IDs and explicit images now - but there's a catch

Google will remove your passport, driver's license, or Social Security number if you ask. But you have to add those details to your request first. Is that safe?

Presidents' Day sales: Everything you need to know

Presidents' Day sales are just around the corner. Here's what to know before spending your money.

Missing emails? Exchange Online is tagging legitimate messages as spam - here's what to do

Some Microsoft Exchange Online customers have been unable to send and receive email. A fix is underway, and here's what to do in the meantime.

Your Roku just got 9 more channels to watch for free - including a big one for Pokemon

Roku adds another lineup of more channels to its free Live TV lineup. Here's how to access the new shows.

AI agents spill secrets just by previewing malicious links

Zero-click prompt injection can leak data when AI agents meet messaging apps, researchers warn

AI agents can shop for you, program for you, and, if you're feeling bold, chat for you in a messaging app. But beware: attackers can use malicious prompts in chat to trick an AI agent into generating a data-leaking URL, which link previews may fetch automatically.…

My AirPods wouldn't stay in my ears - these $20 eartips brought me freedom

Tired of losing your AirPods? These memory foam eartips from Eartune provide a snug fit.

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent

One of the lightest Lenovo ThinkPads I've tested has no business lasting this long per charge

The X13 sacrifices little for its ultraportable form factor, weighing 2.05 pounds with solid hardware.

Discord's new age ID rules are driving users away - here's where they're headed

Unverified users will soon need to upload a video selfie or official ID to remove age restrictions.

Your PC's critical security certificates may be about to expire - how to check

Another crucial Windows expiration date is right around the corner for more than a billion PCs. Here's what you need to do now.

This lightweight Linux distro I tried can run on older machines - but looks modern

If you'd like a lightweight Linux distribution for that aging hardware, but you want a more modern-looking UI, consider Waydog.

How to turn on private DNS on your iPhone - and why it's a must for security

Unencrypted DNS can expose your browsing activity, but private DNS helps keep it private on iPhone. Here's how to set it up.

I disabled this Google Pixel core to free up to 10GB of storage space - how it works

If your Pixel phone is running out of storage space, there's one thing you can do to reclaim GBs: disable a single service.

8 Linux distros I always recommend first to developers - and why

These Linux distributions deliver the compilers, flexibility, and stability serious development work demands.

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection

As ransomware recedes, a new more dangerous digital parasite rises

Meet sleeperware: Here's how attackers are now playing dead on your network until the moment you stop watching.

From Ransomware to Residency: Inside the Rise of the Digital Parasite

By: Unknown
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed across 2025, attackers are no longer optimizing for

Singapore spent 11 months booting China-linked snoops out of telco networks

Operation Cyber Guardian involved 100-plus staff across government and industry

Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country's largest cyber defense operation to date.…

Security Observability Improvements in Cisco Secure Firewall 10.0

Improvements in Secure Firewall 10.0 provide better observability and detection for threats and security monitoring overall.

These Bluetooth trackers beat my AirTags in 2 meaningful ways (and work with Android)

Rolling Square's AirCard Pro and AirNotch Pro will do most tracking work while offering useful design features.
❌