M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds

The latest M-Trends report is based on insights from over 500,000 hours of Mandiant incident response investigations in 2025.
The post M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds appeared first on SecurityWeek.
Continue reading M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds

Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. 
The post Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability appeared first on SecurityWeek.
Continue reading Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability

Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

The lesser-known JackSkid and Mossad botnets have also been targeted in the operation.
The post Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation appeared first on SecurityWeek.
Continue reading Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability

The SharePoint remote code execution vulnerability CVE-2026-20963, which Microsoft patched in January, has been exploited in the wild.
The post CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability appeared first on SecurityWeek.
Continue reading CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability

Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks

Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia.
The post Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks appeared first on SecurityWeek.
Continue reading Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.
The post Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach appeared first on SecurityWeek.
Continue reading Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach