CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack
New Keenadu Android Malware Found on Thousands of Devices
Cogent Security Raises $42 Million for AI-Driven Vulnerability Management
Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration
CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5
Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction
Critical infra Honeywell CCTVs vulnerable to auth bypass flaw
AI platforms can be abused for stealthy malware communication
New Webinar: Defending Against Malicious Browser Extensions
These Sony ANC earbuds dropped to just $70

Daily Cyber News

Stay informed with the latest trends and developments in cybersecurity.

Disclaimer: TenGuard Watch provides curated summaries of articles from trusted sources like The Hacker News, SecurityWeek, and BleepingComputer. For full content, visit the original publication by following the provided links.

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Summary: Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST , likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage....

Impact: Malicious software campaign targeting users and organizations.

Source: The Hacker News - Read Full Article

Read Full Article

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

Summary: New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's p...

Impact: Cybersecurity development requiring attention and monitoring.

Source: The Hacker News - Read Full Article

Read Full Article

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Summary: Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerabil...

Impact: Critical vulnerability requiring immediate attention and patching.

Source: The Hacker News - Read Full Article

Read Full Article

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Summary: Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors ...

Impact: Critical vulnerability requiring immediate attention and patching.

Source: The Hacker News - Read Full Article

Read Full Article

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Summary: In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compl...

Impact: Cybersecurity development requiring attention and monitoring.

Source: The Hacker News - Read Full Article

Read Full Article

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

Summary: A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according...

Impact: Active exploitation observed in the wild, requiring immediate defensive measures.

Source: The Hacker News - Read Full Article

Read Full Article

German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack

Summary: The cyberattack disrupted information and booking systems and lasted for several hours.

Impact: Cyber attack campaign targeting organizations and individuals.

Source: SecurityWeek - Read Full Article

Read Full Article

New Keenadu Android Malware Found on Thousands of Devices

Summary: The malware has been preinstalled on many devices but it has also been distributed through Google Play and other app stores.

Impact: Malicious software campaign targeting users and organizations.

Source: SecurityWeek - Read Full Article

Read Full Article

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Summary: The Series A funding round, led by Bain Capital, brings the total raised by Cogent to $53 million.

Impact: Security vulnerability affecting systems and requiring patching.

Source: SecurityWeek - Read Full Article

Read Full Article

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Summary: Novee researchers discovered 16 vulnerabilities in Foxit and Apryse PDF tools that could have been exploited via malicious documents or URLs.

Impact: Active exploitation observed in the wild, requiring immediate defensive measures.

Source: SecurityWeek - Read Full Article

Read Full Article

CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

Summary: The vulnerability added to CISA’s KEV catalog affects ThreatSonar Anti-Ransomware and it was patched in 2024.

Impact: Active exploitation observed in the wild, requiring immediate defensive measures.

Source: SecurityWeek - Read Full Article

Read Full Article

Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction

Summary: Koi has developed an endpoint security solution that Palo Alto will use to enhance its products.

Impact: Cybersecurity development requiring attention and monitoring.

Source: SecurityWeek - Read Full Article

Read Full Article

Critical infra Honeywell CCTVs vulnerable to auth bypass flaw

Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijackin...

Impact: Critical vulnerability requiring immediate attention and patching.

Source: BleepingComputer - Read Full Article

Read Full Article

AI platforms can be abused for stealthy malware communication

Summary: AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.

Impact: Malicious software campaign targeting users and organizations.

Source: BleepingComputer - Read Full Article

Read Full Article

New Webinar: Defending Against Malicious Browser Extensions

Summary: Attackers are doubling down on malicious browser extensions as their method of choice, stealing data, intercepting cookies and tokens, logging keystrokes, and more.

Impact: Cyber attack campaign targeting organizations and individuals.

Source: BleepingComputer - Read Full Article

Read Full Article

These Sony ANC earbuds dropped to just $70

Summary: If you've been waiting for a recognizable audio brand to hit a realistic price point, this is it. The new, open-box Sony WF-C710N Truly Wireless Noise-Canceling Earbuds are now just $69.99 (MSRP $129....

Impact: Cybersecurity development requiring attention and monitoring.

Source: BleepingComputer - Read Full Article

Read Full Article