Photo by Kevin Ache Cyber Watch FreeBSD IPv6 Flaw Enables Remote Code Execution Attacks A critical vulnerability in FreeBSD's IPv6 auto-configuration feature (CVE-2025-14558) scores 9.8/10 and allows attackers on the same network to execute arbitrary commands with a single malicious packet. SL • 5 min read
Photo: Andrei Stratu News How ICSS Conference 2026 Reframes ICS Security Priorities Industrial incidents linked to ransomware and exploited network devices are no longer edge cases in Japan. They are forcing factory shutdowns, disrupting supply chains, and pulling executive teams into security decisions that once sat deep in engineering departments. Against this backdrop, the Control System Security Conference 2026 (ICSS 2026) arrives SL • 4 min read
Infected PNG image (Illustration) Threat Horizon GhostPoster Campaign: How Malicious Firefox Extensions Hide Code in Logo Files Security researchers discover 17 Firefox extensions using PNG steganography to hide multi-stage malware affecting 50,000+ users. SL • 5 min read
ReliaQuest Logo (Photo: ReliaQuest, Edit: Security.land) Threat Horizon How Storm-0249 Abuses EDR Trust: A Breakdown of New ReliaQuest Findings New ReliaQuest research reveals IAB Storm-0249 is sideloading malicious DLLs via legitimate EDR processes to evade detection. SL • 4 min read
ESET Logo (Photo: Eset, Edit: Security.land) Business Shield AI-Powered Ransomware Emerges as Cyber Threats Surge in H2 2025 ESET uncovers PromptLock, first AI-driven ransomware, as cyber threats evolve rapidly. CloudEyE surges 30x while ransomware victims jump 40%. SL • 5 min read
Cybersecurity Conference JSAC2026 in Tokyo, Japan News Ready for the Next Threat? JSAC2026 Gathers Global Cyber Defenders in Tokyo Join JPCERT/CC at JSAC2026 in Tokyo (Jan 22-23) for free, deep technical sessions on incident response, APTs (Earth Kurma, Stately Taurus), RapperBot analysis, and advanced malware forensics. Essential for security analysts. SL • 3 min read
DDoS Attack (Illustration) Threat Horizon Censys Reveals Rapid Server Rotation Behind NoName057(16) Attacks Censys research reveals DDoSia control servers last avg 2.5 days, with 6 active at any time. Analysis of pro-Russian DDoS infrastructure. SL • 6 min read
Medusa Ransomware Group Breach Breakdown Inside Medusa Ransomware: Tactics, Targets, and Trends in Recent Operations In‑depth analysis of recent Medusa ransomware group operations, victim data and extortion schemes. SL • 5 min read
Kali Linux - Release 2025.4 (Source: Kali) Skills Lab Kali Linux 2025.4: Refined Workflows and Practical Updates Kali Linux 2025.4 improves desktop usability, VM support, and tooling. Key changes include Wayland enhancements and distribution adjustments. SL • 1 min read