On the Importance of “Hello” and “Thanks”
In a recent conversation with a Let’s Encrypt subscriber, we asked them to guess how many people work at ISRG, the nonprofit behind Let’s Encrypt (and Prossimo and Divvi Up). Their guess was about 100; they’d overestimated by 72.5 people. We’re a pretty small team, and we get a lot done, but most of that work is entirely remote,...
Revving up to build: Top Down with Matt Nowzari
Matt Nowzari is a software engineer on Elastic’s Search team, shaping how external data flows into Elasticsearch. - Read more
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure - Read more
Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms
Microsoft confirms a Windows bug preventing some PCs from shutting down or hibernating after January 2026 updates. A fix is still pending.
The post Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms appeared first on TechRepublic. - Read more
Kelly Hiscoe Recognized Among CRN 2026 Channel Chiefs for Innovation and Impact
In 2026, security teams are still grappling with the challenges posed by expanding attack surfaces and persistent resource constraints. Together with the rapid onset of AI-driven threats, security leaders are weathering this ‘perfect storm’ by seeking consolidation of their technology stacks – favoring trusted partnerships that truly understand their unique ecosystems.To elevate security partners from mere service providers to...
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
Key Points
Check Point Research (CPR) has been tracking Amaranth-Dragon, a nexus of APT-41, previously aligned with Chinese interests. The group launched highly targeted cyber-espionage campaigns throughout 2025 against government and law enforcement agencies in Southeast Asia. We observed overlaps between Amaranth-Dragon and APT-41’s arsenal, suggesting a possible connection or shared resources between them. Further analysis of file compilation...
How to Reduce False Positives Using Connected Intelligence
False positives are one of the biggest barriers to effective phishing defense. When security teams are overwhelmed with noisy alerts, real threats hide in plain sight, investigations slow down, and analyst confidence erodes. Reducing false positives is more than tuning detection rules, it requires connected intelligence that brings together human insight, verified threat data, and supervised AI to deliver...
Cofense Report Reveals AI-Powered Phishing Accelerated to One Attack Every 19 Seconds
LEESBURG, Va., February 4, 2026 -- Cofense, the leading provider of intelligence-driven post-perimeter phishing defense, today released its latest threat intelligence report, The New Era of Phishing: Threats Built in the Age of AI, revealing how AI technologies are now central to how threat actors operate, fundamentally transforming the speed, scale, and sophistication of modern phishing attacks.In 2025, Cofense analysts...
Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious
Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations. - Read more



