Latest News
Upside's list of articles and news
Microsoft Warns of DNS-Based ClickFix Attack Using Nslookup to Deploy Malware
Feb 16, 2026
New DNS-based ClickFix attack tricks users into executing malicious commands, allowing malware to stage through nslookup and evade detection. This sophisticated technique blends into normal network traffic, highlighting the evolving threat of social engineering.
6.8 Billion Email Addresses Leaked: A Wake-Up Call for Every Organization
Feb 13, 2026
A hacker claims to have leaked 6.8 billion email addresses in a 150GB archive, with researchers verifying roughly 3 billion as usable. The dataset could fuel large-scale phishing and business email compromise attacks through highly targeted social engineering.
New Open-Source Tool Exposes 210+ AI Attack Techniques: Is Your LLM Secure?
Feb 12, 2026
Augustus is a new open-source LLM vulnerability scanner capable of launching over 210 adversarial attacks against 28 AI providers. Built as a fast, portable Go binary, it enables production-ready red teaming to identify jailbreaks, prompt injections, and data leakage risks.
Hackers Using Windows Screensavers to Gain Stealthy Access: Is Your Business Protected?
Feb 11, 2026
Hackers are exploiting Windows screensaver files to secretly install legitimate remote management tools, giving them persistent control over systems. This tactic blends malicious activity into normal network traffic, making detection and prevention much more difficult.
Pirated Games Are Delivering More Than Entertainment: Malware Threats on the Rise
Feb 10, 2026
A new Windows malware called RenEngine loader is hiding inside pirated PC games, infecting over 400,000 devices worldwide. It secretly steals sensitive data from browsers, wallets, and system files while remaining undetected by most antivirus programs.
macOS Users Now Targeted by Rapidly Expanding Malware Threats
Feb 9, 2026
macOS users are now facing a rapidly expanding ecosystem of malware and infostealers targeting browser sessions, cloud tokens, and developer credentials. Threat actors are using social engineering, malicious ads, and legitimate tools to propagate these attacks across mixed environments.
Ransomware Operators Exploit Legitimate VM Platforms: Why Cybersecurity Cannot Wait
Feb 6, 2026
Ransomware groups have exploited virtual machines with default hostnames to stealthily deliver malicious payloads, blending in with legitimate servers. This highlights the growing need for proactive monitoring and secure configuration of virtualized environments.
Critical AI Vulnerability Highlights the Need for Proactive Cybersecurity
Feb 5, 2026
A critical vulnerability in the OpenClaw AI assistant allows attackers to execute malicious code on user systems via a single link, bypassing safety controls. This exploit highlights the risks of granting AI agents unrestricted system access without robust validation and monitoring.
Why Browser Password Managers Put Businesses at Risk
Feb 4, 2026
Browser-based password managers can expose credentials if devices or cloud accounts are compromised, putting personal and business data at risk. Dedicated password management tools with master passwords and strong access controls provide stronger protection against modern cyber threats.
What the Canada Computers Data Breach Teaches Us About Cybersecurity Risk
Feb 3, 2026
A Canadian electronics retailer disclosed a website breach exposing customer payment and personal data, sparking frustration over delayed and inconsistent communication. The incident highlights the risks in e-commerce checkout systems and the real consequences of weak breach transparency.
When a Trusted Provider Is Breached: What Businesses Need to Know
Feb 2, 2026
Marquis Software Solutions attributes a ransomware attack affecting U.S. banks to stolen firewall backup data from SonicWall’s cloud service. The incident highlights how breaches of trusted providers can cascade into major enterprise impacts.
New Malware Attack Is Bypassing Traditional Security: Here’s What Businesses Need to Know
Jan 30, 2026
A new malware campaign abuses fake CAPTCHA prompts and trusted Windows virtualization components to trick users into manually triggering infections. By blending social engineering with legitimate Microsoft infrastructure, attackers evade detection while deploying stealthy information-stealing malware.



.webp)



.webp)


.webp)

