• About Us
IT Systems Networked
  • Home
  • Log In
    • Membership Levels
    • Membership Account
      • Your Profile
      • Membership Billing
      • Membership Orders
      • Membership Cancel
    • Membership Confirmation
    • Membership Checkout
  • Services
    • Computers
    • Networks
    • Access Controls
    • Surveillance
    • Tech Support
    • Managed Services
    • VOIP
    • Consulting
    • POS
    • Audio
  • Requests
    • Quote
    • Client Portal
    • Ticket System
    • Incident Report
    • Downloads
    • Work From Home
  • Contact
Select Page

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

by bor1cua | Apr 23, 2026 | Cybersecurity Resources

Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with...

Toxic Combinations: When Cross-App Permissions Stack into Risk

by bor1cua | Apr 23, 2026 | Cybersecurity Resources

On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside the...

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

by bor1cua | Apr 23, 2026 | Cybersecurity Resources

Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting...

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

by bor1cua | Apr 22, 2026 | Cybersecurity Resources

Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server...

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

by bor1cua | Apr 22, 2026 | Cybersecurity Resources

A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O’Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in...

22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters

by bor1cua | Apr 22, 2026 | Cybersecurity Resources

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been...
« Older Entries
Next Entries »
  • About Us
  • Facebook
  • X
  • Instagram
  • RSS
Copyright © 2024 | IT Systems Networked