Krebs on Security

Krebs on Security In-depth security news and investigation

  • Patch Tuesday, April 2026 Edition
    by BrianKrebs on April 14, 2026 at 9:47 pm

    Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed “BlueHammer.” Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.

  • Russia Hacked Routers to Steal Microsoft Office Tokens
    by BrianKrebs on April 7, 2026 at 5:02 pm

    Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
    by BrianKrebs on April 6, 2026 at 2:07 am

    An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.

  • ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
    by BrianKrebs on March 23, 2026 at 3:43 pm

    A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language.

  • Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
    by BrianKrebs on March 20, 2026 at 12:49 am

    The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
    by BrianKrebs on March 11, 2026 at 4:20 pm

    A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U.S. headquarters says the company is currently experiencing a building emergency.

  • Microsoft Patch Tuesday, March 2026 Edition
    by BrianKrebs on March 11, 2026 at 12:32 am

    Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing “zero-day” flaws this month (compared to February’s five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month’s Patch Tuesday.

  • How AI Assistants are Moving the Security Goalposts
    by BrianKrebs on March 8, 2026 at 11:35 pm

    AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.

  • Who is the Kimwolf Botmaster “Dort”?
    by BrianKrebs on February 28, 2026 at 12:01 pm

    In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world’s largest and most disruptive botnet. Since then, the person in control of Kimwolf — who goes by the handle “Dort” — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher’s home. This post examines what is knowable about Dort based on public information.

  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
    by BrianKrebs on February 20, 2026 at 8:00 pm

    Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and then acts as a relay between the target and the legitimate site — forwarding the victim’s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.