Google patches actively exploited Chrome zero-day
The flaw, tracked as CVE-2026-2441, is the first Chrome zero-day patched since the beginning of the year.
The flaw, tracked as CVE-2026-2441, is the first Chrome zero-day patched since the beginning of the year.
The campaign uses basic tooling and legitimate web services to blend malicious activity with normal traffic.
GTIG says that the group is less sophisticated and less resourced than other Russian threat actors.
In brief: Microsoft, Apple, and Fortinet fix zero-days, SolarWinds and Ivanti flaws exploited by hackers, and more.
GreyNoise said it recorded 417 exploitation sessions from eight unique source IP addresses between February 1 and 9, 2026.
The company also noted that two previously disclosed flaws, CVE-2025-14174 and CVE-2025-43529, were exploited in the same incidents.
The botnet incorporates exploits for more than a dozen Linux kernel vulnerabilities dating back to 2009–2010.
In total, the researchers observed seven distinct macOS malware families installed on the victim’s system.
Malwarebytes says the campaign impersonates not only 7-Zip, but HolaVPN, TikTok, WhatsApp, and Wire VPN.
There is currently no public information detailing attacks that exploited the flaws.
Showing elements 121 - 130