• About Us
IT Systems Networked
  • Home
  • Log In
    • Membership Levels
    • Membership Account
      • Your Profile
      • Membership Billing
      • Membership Orders
      • Membership Cancel
    • Membership Confirmation
    • Membership Checkout
  • Services
    • Computers
    • Networks
    • Access Controls
    • Surveillance
    • Tech Support
    • Managed Services
    • VOIP
    • Consulting
    • POS
    • Audio
  • Requests
    • Quote
    • Client Portal
    • Ticket System
    • Incident Report
    • Downloads
    • Work From Home
  • Contact
Select Page

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

by bor1cua | Mar 26, 2026 | Cybersecurity Resources

Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and installing a remote access trojan (RAT), which deploys an information-stealing Google Chrome extension...

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

by bor1cua | Mar 26, 2026 | Cybersecurity Resources

The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS and MVD Media, a news website linked to the Russian Interior Ministry, the suspect is a resident of...

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

by bor1cua | Mar 26, 2026 | Cybersecurity Resources

The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who...

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

by bor1cua | Mar 26, 2026 | Cybersecurity Resources

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance, writing...

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

by bor1cua | Mar 26, 2026 | Cybersecurity Resources

Cybersecurity researchers are calling attention to an active device code phishing campaign that’s targeting Microsoft 365 identities across more than 340 organizations in the U.S., Canada, Australia, New Zealand, and Germany. The activity, per Huntress, was...

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

by bor1cua | Mar 25, 2026 | Cybersecurity Resources

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor....
« Older Entries
Next Entries »
  • About Us
  • Facebook
  • X
  • Instagram
  • RSS
Copyright © 2024 | IT Systems Networked