top of page

Latest News

Upside's list of articles and news

Microsoft Warns of DNS-Based ClickFix Attack Using Nslookup to Deploy Malware

Feb 16, 2026

New DNS-based ClickFix attack tricks users into executing malicious commands, allowing malware to stage through nslookup and evade detection. This sophisticated technique blends into normal network traffic, highlighting the evolving threat of social engineering.

6.8 Billion Email Addresses Leaked: A Wake-Up Call for Every Organization

Feb 13, 2026

A hacker claims to have leaked 6.8 billion email addresses in a 150GB archive, with researchers verifying roughly 3 billion as usable. The dataset could fuel large-scale phishing and business email compromise attacks through highly targeted social engineering.

New Open-Source Tool Exposes 210+ AI Attack Techniques: Is Your LLM Secure?

Feb 12, 2026

Augustus is a new open-source LLM vulnerability scanner capable of launching over 210 adversarial attacks against 28 AI providers. Built as a fast, portable Go binary, it enables production-ready red teaming to identify jailbreaks, prompt injections, and data leakage risks.

Hackers Using Windows Screensavers to Gain Stealthy Access: Is Your Business Protected?

Feb 11, 2026

Hackers are exploiting Windows screensaver files to secretly install legitimate remote management tools, giving them persistent control over systems. This tactic blends malicious activity into normal network traffic, making detection and prevention much more difficult.

Pirated Games Are Delivering More Than Entertainment: Malware Threats on the Rise

Feb 10, 2026

A new Windows malware called RenEngine loader is hiding inside pirated PC games, infecting over 400,000 devices worldwide. It secretly steals sensitive data from browsers, wallets, and system files while remaining undetected by most antivirus programs.

macOS Users Now Targeted by Rapidly Expanding Malware Threats

Feb 9, 2026

macOS users are now facing a rapidly expanding ecosystem of malware and infostealers targeting browser sessions, cloud tokens, and developer credentials. Threat actors are using social engineering, malicious ads, and legitimate tools to propagate these attacks across mixed environments.

Ransomware Operators Exploit Legitimate VM Platforms: Why Cybersecurity Cannot Wait

Feb 6, 2026

Ransomware groups have exploited virtual machines with default hostnames to stealthily deliver malicious payloads, blending in with legitimate servers. This highlights the growing need for proactive monitoring and secure configuration of virtualized environments.

Critical AI Vulnerability Highlights the Need for Proactive Cybersecurity

Feb 5, 2026

A critical vulnerability in the OpenClaw AI assistant allows attackers to execute malicious code on user systems via a single link, bypassing safety controls. This exploit highlights the risks of granting AI agents unrestricted system access without robust validation and monitoring.

Why Browser Password Managers Put Businesses at Risk

Feb 4, 2026

Browser-based password managers can expose credentials if devices or cloud accounts are compromised, putting personal and business data at risk. Dedicated password management tools with master passwords and strong access controls provide stronger protection against modern cyber threats.

What the Canada Computers Data Breach Teaches Us About Cybersecurity Risk

Feb 3, 2026

A Canadian electronics retailer disclosed a website breach exposing customer payment and personal data, sparking frustration over delayed and inconsistent communication. The incident highlights the risks in e-commerce checkout systems and the real consequences of weak breach transparency.

When a Trusted Provider Is Breached: What Businesses Need to Know

Feb 2, 2026

Marquis Software Solutions attributes a ransomware attack affecting U.S. banks to stolen firewall backup data from SonicWall’s cloud service. The incident highlights how breaches of trusted providers can cascade into major enterprise impacts.

New Malware Attack Is Bypassing Traditional Security: Here’s What Businesses Need to Know

Jan 30, 2026

A new malware campaign abuses fake CAPTCHA prompts and trusted Windows virtualization components to trick users into manually triggering infections. By blending social engineering with legitimate Microsoft infrastructure, attackers evade detection while deploying stealthy information-stealing malware.

bottom of page