Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts - Read more

AI Capabilities Are Advancing Faster Than AI Security

AI Security Insights – February 2026 - Read more

The Global Fight Over Who Controls Your Data Just Escalated — Here’s What the...

A new diplomatic offensive against foreign privacy laws collides with fresh research showing that weakening data sovereignty protections is the last thing organizations need...

Qilin crew continues to dominate ransomware ecosystem

The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and...

Chargemap chargemap.com

View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service...

Pelco, Inc. Sarix Pro 3 Series IP Cameras

View CSAF Summary Successful exploitation of this vulnerability could allow attackers to gain unauthorized access to sensitive device data, bypass surveillance controls, and expose facilities to...

Yokogawa CENTUM VP R6, R7

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to terminate the software stack process, cause a denial-of-service condition, or execute arbitrary code. The...

New Dohdoor malware campaign targets education and health care

Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.” Dohdoor utilizes the DNS-over-HTTPS (DoH)...

Fake UK government website redirect detection time reduced to eight days

It used to take two months, but the UK government has reduced the time it takes to address fake DNS redirects - Read...

Latest article

Looking at the SmarterMail API Vulnerability CVE-2026-24423

Sensor Intel Series: February 2026 CVE Trends - Read more

Security Flaw in WordPress Plugin Puts 400,000 Websites at Risk

A security flaw in the Ally WordPress plugin used on more than 400,000 sites could allow attackers to extract sensitive data without logging in. The...

Medical giant Stryker crippled after Iranian hackers remotely wipe computers

A major cyberattack on US medical supplies giant Stryker has resulted in thousands of devices being remotely wiped, after a...

This one’s for you, Mom

Welcome to this week’s edition of the Threat Source newsletter. I am the product of a single parent, my mom, who along with my grandparents...