Kees - Nijkerk's Avatar

Kees - Nijkerk

@keesnk

❤️Miranda | Vader van zoon & dochter | Waterpolo Flevo | Sparta N. | Ajax | ICT Infra & Security Architect.

68
Followers
51
Following
2,637
Posts
11.11.2024
Joined
Posts Following

Latest posts by Kees - Nijkerk @keesnk

Post image

Google releases Emergency Chrome Update to Fix 10 Security Vulnerabilities:

cybersecuritynews.com/critical-chr...

05.03.2026 08:25 👍 0 🔁 0 💬 0 📌 0
Post image

Operation Leak dismantles LeakBase Cybercriminal Forum – User Data, IP Logs secured by Authorities:

cybersecuritynews.com/operation-le...

05.03.2026 08:24 👍 0 🔁 0 💬 0 📌 0
Post image

Trusted Azure Utility AzCopy turned into Data Exfiltration Tool in Active Ransomware Campaigns:

cybersecuritynews.com/trusted-azur...

05.03.2026 08:23 👍 0 🔁 0 💬 0 📌 0
Post image

Tycoon 2FA Phishing Kit disrupted by Microsoft, Europol and Partners:

cybersecuritynews.com/tycoon-2fa-p...

05.03.2026 08:22 👍 1 🔁 0 💬 0 📌 0
Post image

CISA warns of VMware Aria Operations Vulnerability exploited in Attacks:

cybersecuritynews.com/vmware-aria-...

04.03.2026 07:26 👍 0 🔁 0 💬 0 📌 0
Post image

Malicious Packages disguised as Laravel Utilities deploy PHP RAT and enables Remote Access:

cybersecuritynews.com/malicious-pa...

04.03.2026 07:25 👍 0 🔁 0 💬 0 📌 0
Post image

Windows 11 23H2 to 25H2 Upgrade allegedly breaking Internet Connectivity:

cybersecuritynews.com/windows-11-2...

04.03.2026 07:24 👍 0 🔁 0 💬 0 📌 0
Post image

Coruna Exploit Kit with 23 Exploits hacked Thousands of iPhones:

cybersecuritynews.com/coruna-ios-e...

04.03.2026 07:24 👍 0 🔁 0 💬 0 📌 0
Post image

SloppyLemming Espionage Campaign uses BurrowShell Backdoor and Rust RAT to Hit Pakistan and Bangladesh Targets:

cybersecuritynews.com/sloppylemmin...

04.03.2026 07:23 👍 0 🔁 0 💬 0 📌 0
Post image

Malvertising Threat Actor ‘D‑Shortiez’ abuses WebKit Back‑Button Hijack in Forced‑Redirect Browser Campaign:

cybersecuritynews.com/malvertising...

04.03.2026 07:22 👍 0 🔁 0 💬 0 📌 0
Post image

LexisNexis Data Breach — Threat Actor allegedly claims 2.04 GB Stolen:

cybersecuritynews.com/lexisnexis-d...

04.03.2026 07:22 👍 0 🔁 0 💬 0 📌 0
Post image

Microsoft warns of new Phishing Attack exploiting OAuth in Entra ID to Evade Detection:

cybersecuritynews.com/phishing-att...

04.03.2026 07:21 👍 0 🔁 0 💬 0 📌 0
Post image

Zerobot Malware exploiting Tenda Command Injection Vulnerabilities to Deploy Malware:

cybersecuritynews.com/zerobot-malw...

04.03.2026 07:20 👍 0 🔁 0 💬 0 📌 0
Post image

New ‘StegaBin’ Campaign uses Malicious 26 npm Packages to deploy Multi-Stage Credential Stealer:

cybersecuritynews.com/new-stegabin...

04.03.2026 07:18 👍 0 🔁 0 💬 0 📌 0
Post image

Hackers leverage Telegram for initial Access to Corporate VPN, RDP, and Cloud Environments:

cybersecuritynews.com/hackers-leve...

04.03.2026 07:17 👍 1 🔁 0 💬 1 📌 0
Post image

Epic Fury/Roaring Lion sparks escalating Cyber Conflict as Iran goes Offline, Hacktivists step up Retaliation:

cybersecuritynews.com/epic-fury-ro...

04.03.2026 07:16 👍 0 🔁 0 💬 0 📌 0
Post image

How to Cut MTTR by improving Threat Visibility in your SOC:

cybersecuritynews.com/how-to-cut-m...

04.03.2026 07:14 👍 0 🔁 0 💬 0 📌 0
Post image

Malvertising Campaign delivers AMOS ‘malext’ macOS Infostealer via Fake Text‑Sharing Lures:

cybersecuritynews.com/malvertising...

04.03.2026 07:14 👍 0 🔁 0 💬 0 📌 0
Post image

Google unveils Merkle Tree Certificates to Shield HTTPS Against Quantum Threats:

cybersecuritynews.com/google-chrom...

04.03.2026 07:13 👍 0 🔁 0 💬 0 📌 0
Post image

Threat Actors exploit OpenVSX Aqua Trivy with Malicious AI Prompts to hijack Local Coding Tools:

cybersecuritynews.com/threat-actor...

03.03.2026 08:26 👍 1 🔁 0 💬 0 📌 0
Post image

Hackers leveraged CyberStrikeAI Tool to breach Fortinet FortiGate Devices:

cybersecuritynews.com/cyberstrikea...

03.03.2026 08:25 👍 0 🔁 0 💬 0 📌 0
Post image

Android Security Update – Patch for 129 Vulnerabilities and actively exploited Zero-Day:

cybersecuritynews.com/android-secu...

03.03.2026 08:25 👍 0 🔁 0 💬 0 📌 0
Post image

Threat Actors deploy ‘AuraStealer’ Infostealer with 48 C2 Domains and Active Campaigns:

cybersecuritynews.com/threat-actor...

03.03.2026 08:24 👍 0 🔁 0 💬 0 📌 0
Post image

Chrome Gemini Vulnerability lets Attackers Access Victims’ Camera and Microphone Remotely:

cybersecuritynews.com/chrome-gemin...

03.03.2026 08:23 👍 0 🔁 0 💬 0 📌 0
Post image

PoC Exploit released for Windows Error Reporting ALPC Privilege Escalation:

cybersecuritynews.com/poc-windows-...

03.03.2026 08:23 👍 0 🔁 0 💬 0 📌 0
Post image

MSHTML Framework 0-Day exploited by APT28 Hackers before Feb 2026’s Patch Tuesday Update:

cybersecuritynews.com/mshtml-frame...

03.03.2026 08:22 👍 0 🔁 0 💬 0 📌 0
Post image

Claude AI suffers Global Outage: Elevated Errors disrupt Web Interface and APIs:

cybersecuritynews.com/claude-ai-su...

03.03.2026 08:22 👍 0 🔁 1 💬 0 📌 0
Post image

Hackers attacking SonicWall Firewalls from 4,000+ unique IP Addresses to exploit Vulnerabilities:

cybersecuritynews.com/hackers-atta...

03.03.2026 08:21 👍 0 🔁 0 💬 0 📌 0
Post image

Hacked Prayer App used as Cyber Weapon During US-Israel Strikes on Iran:

cybersecuritynews.com/hacked-praye...

02.03.2026 07:10 👍 0 🔁 0 💬 0 📌 0
Post image

AWS Power Outage in Middle East triggers Major Disruption to EC2 and Networking Services:

cybersecuritynews.com/aws-power-ou...

02.03.2026 07:10 👍 0 🔁 0 💬 0 📌 0