Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Articles

  • Home
  • Articles
From Schneier on Security – LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days
Posted inArticles

From Schneier on Security – LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days

 This is amazing: Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability…
Posted by Samir K February 9, 2026
From Graham Cluley – Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam
Posted inArticles

From Graham Cluley – Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

When a Romanian businesswoman fell for a fake Dubai Crown Prince in a $2.5 million romance scam, investigators tracked the fraudster to his Nigerian mansion - only to discover he…
Posted by Samir K February 7, 2026
From Schneier on Security – Friday Squid Blogging: Squid Fishing Tips
Posted inArticles

From Schneier on Security – Friday Squid Blogging: Squid Fishing Tips

 This is a video of advice for squid fishing in Puget Sound. As usual, you can also use this squid post to talk about the security stories in the news…
Posted by Samir K February 7, 2026
From Schneier on Security – I Am in the Epstein Files
Posted inArticles

From Schneier on Security – I Am in the Epstein Files

 Once. Someone named “Vincenzo lozzo” wrote to Epstein in email, in 2016: “I wouldn’t pay too much attention to this, Schneier has a long tradition of dramatizing and misunderstanding things.”…
Posted by Samir K February 7, 2026
From Schneier on Security – iPhone Lockdown Mode Protects Washington Post Reporter
Posted inArticles

From Schneier on Security – iPhone Lockdown Mode Protects Washington Post Reporter

 404Media is reporting that the FBI could not access a reporter’s iPhone because it had Lockdown Mode enabled: The court record shows what devices and data the FBI was able…
Posted by Samir K February 6, 2026
From Graham Cluley – Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire
Posted inArticles

From Graham Cluley – Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire

He promised "the best security there is" to hundreds of thousands of drug buyers, while quietly making the kind of mistake that guaranteed a 30-year sentence. And maybe training police…
Posted by Samir K February 6, 2026
From Schneier on Security – Backdoor in Notepad++
Posted inArticles

From Schneier on Security – Backdoor in Notepad++

 Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users. Notepad++ said that officials with the unnamed provider hosting the update infrastructure…
Posted by Samir K February 5, 2026
From Graham Cluley – Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well
Posted inArticles

From Graham Cluley – Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well

Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about - especially when AI, LinkedIn, and a few biographical breadcrumbs do the heavy lifting. Sloppy redaction leads…
Posted by Samir K February 5, 2026
From Schneier on Security – US Declassifies Information on JUMPSEAT Spy Satellites
Posted inArticles

From Schneier on Security – US Declassifies Information on JUMPSEAT Spy Satellites

 The US National Reconnaissance Office has declassified information about a fleet of spy satellites operating between 1971 and 2006. I’m actually impressed to see a declassification only two decades after…
Posted by Samir K February 4, 2026
From Schneier on Security – Microsoft is Giving the FBI BitLocker Keys
Posted inArticles

From Schneier on Security – Microsoft is Giving the FBI BitLocker Keys

 Microsoft gives the FBI the ability to decrypt BitLocker in response to court orders: about twenty times per year. It’s possible for users to store those keys on a device…
Posted by Samir K February 3, 2026
From Krebs on Security – Please Don’t Feed the Scattered Lapsus ShinyHunters
Posted inArticles

From Krebs on Security – Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting…
Posted by Samir K February 2, 2026
From Schneier on Security – AI Coding Assistants Secretly Copying All Code to China
Posted inArticles

From Schneier on Security – AI Coding Assistants Secretly Copying All Code to China

 There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China. Maybe avoid using them. Read…
Posted by Samir K February 2, 2026
From Graham Cluley – FBI takes notorious RAMP ransomware forum offline
Posted inArticles

From Graham Cluley – FBI takes notorious RAMP ransomware forum offline

The FBI has seized control of RAMP, a notorious cybercrime online forum that bragged to be the only place that allowed ransomware, and boasted over 14,000 active users. Now some…
Posted by Samir K January 31, 2026
From Schneier on Security – Friday Squid Blogging: New Squid Species Discovered
Posted inArticles

From Schneier on Security – Friday Squid Blogging: New Squid Species Discovered

 A new species of squid. pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the seafloor—a behavior never documented in…
Posted by Samir K January 31, 2026
From Schneier on Security – AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
Posted inArticles

From Schneier on Security – AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

 From an Anthropic blog post: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using…
Posted by Samir K January 30, 2026

Posts pagination

1 2 3 … 91 Next page

Latest Posts

  • From Dark Reading – Warlock Gang Breaches SmarterTools Via SmarterMail BugsFebruary 10, 2026
  • From Dark Reading – TeamPCP Turns Cloud Infrastructure into Crime BotsFebruary 10, 2026
  • From Dark Reading – Black Basta Bundles BYOVD With Ransomware PayloadFebruary 10, 2026
  • From Security Week – Lema AI Emerges From Stealth With $24 Million to Tackle Third-Party Risk February 9, 2026
  • From The Hacker News – China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage CampaignFebruary 9, 2026
Total Visitors
1071116

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top