Hackers use fake Booking.com pages and ClickFix tactics to infect hotels with PureRAT and steal data.
Hackers use fake Booking.com pages and ClickFix tactics to infect hotels with PureRAT and steal data.
Please see attached a list of predictions for where technology and cybersecurity may transcend in 2026. Thanks for reading and sharing! Chuck Brooks.
Note AI enabled but derived entirely from a wide variety of my own published writings interviews, podcasts, and my book “Inside Cyber”
#2026predictions #tech #artificialintelligence #cybersecurity #quantum | on LinkedIn.
Threat actors are actively exploiting a critical vulnerability in the Post SMTP plugin installed on more than 400,000 WordPress sites, to take complete control by hijacking administrator accounts.
Post SMTP is a popular email delivery solution marketed as a feature-rich and more reliable replacement of the default ‘wp_mail’ function.
On October 11, WordPress security firm Wordfence received a report from researcher ‘netranger’ about an email log disclosure issue that could be leveraged for account takeover attacks.
The Apache Software Foundation disputes claims that its OpenOffice project suffered an Akira ransomware attack, after the threat actors claimed to have stolen 23 GB of corporate documents.
Apache OpenOffice is a free, open-source office suite that includes word processing, spreadsheets, presentations, graphics, and database tools. It’s compatible with major file formats, such as Word and Excel, and runs on multiple operating systems.
On October 30th, the Akira ransomware gang claimed it had breached Apache OpenOffice and stolen 23 GB of data, including employee and financial information, as well as internal files.
Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024 and May 2025, notes a report from cloud security company Zscaler.
During the same period, the company observed a 67% year-over-year growth in malware targeting mobile devices, with spyware and banking trojans being a prevalent risk.
Telemetry data shows that threat actors are shifting from traditional card fraud to exploiting mobile payments using phishing, smishing, SIM-swapping, and payment scams.