Elles De Yeager
-

Swiss NCSC Warns of iPhone Phishing Scams After Device Loss
The Swiss National Cyber Security Centre (NCSC) has warned iPhone users about a sophisticated phishing campaign that targets owners of lost devices. Scammers send convincing messages to steal Apple ID credentials, enabling them to bypass critical security features like Activation Lock. Users are advised against clicking unsolicited links and to activate Lost Mode immediately for…
-

AI, Quantum, and Data Sovereignty: Reshaping 2026 Cybersecurity Landscape
The year 2026 is poised to redefine enterprise cybersecurity, as experts predict significant shifts driven by the maturation of artificial intelligence, the looming threat of quantum computing, and an increasingly complex global regulatory landscape. These converging forces will necessitate a fundamental re-evaluation of digital trust and security protocols across industries.
-

Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Russian authorities have detained eight individuals in the republic of Bashkortostan, alleging their involvement in a plot to sabotage telecommunications infrastructure. The detentions signal a heightened focus on internal security amidst ongoing international tensions.
-

Critical Cisco Firewall Flaws Exploited for Denial-of-Service Attacks
Cisco firewalls are facing new denial-of-service attacks exploiting critical vulnerabilities, CVE-2025-20333 and CVE-2025-20362. These flaws in Cisco’s Secure Firewall ASA and FTD software allow attackers to gain control and force device reloads, disrupting network services. The ongoing exploitation highlights the urgent need for timely patching and continuous vigilance in network security.
-

Arctic Wolf Acquires UpSight Security, Bolstering Ransomware Prevention with Predictive AI
Arctic Wolf acquires UpSight Security to enhance ransomware prevention with predictive AI, integrating advanced capabilities into its Aurora endpoint platform for proactive threat neutralization and rapid recovery.
-

Google’s AI “Big Sleep” Uncovers Five Critical WebKit Vulnerabilities in Apple Software
Google’s advanced artificial intelligence, dubbed “Big Sleep,” has reportedly identified five critical vulnerabilities within Apple’s widely used WebKit rendering engine, raising fresh questions about the evolving role of AI in cybersecurity and the relentless challenge of securing omnipresent software platforms.
-

Ukrainian Drones Strike Russian Industrial Facilities
Ukrainian drones struck an industrial complex in Russia’s central republic of Bashkortostan and a power substation in the Kursk region, according to statements from regional authorities. The incidents mark a continuation of cross-border attacks targeting critical infrastructure.
-

SleepyDuck Malware Evolves with Ethereum C2 Resilience
A new sophisticated remote access trojan, dubbed “SleepyDuck,” has been discovered in the Open VSX registry, a marketplace for IDE extensions. Initially published as a benign extension on October 31, 2025, it was updated on November 1, 2025, to include malicious capabilities and has since garnered over 14,000 downloads.
-

Malicious VSX Extension “SleepyDuck” Leverages Ethereum for Command and Control
A malicious VSX extension dubbed “SleepyDuck” has been discovered in the Open VSX registry, utilizing the Ethereum blockchain for its command and control (C2) infrastructure. Initially distributed as a legitimate Solidity development tool, the extension was updated to include malicious functionalities, posing a significant threat to developers.
-

North Korean Actors Target Web3, New Side-Channel Attacks Exploit Intel/AMD TEEs
North Korean Actors Target Web3, New Side-Channel Attacks Exploit Intel/AMD TEEs
