<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Category: Cyber Security News</title>
<link>https://blog.roxohost.com/rss/category/Malware, hacks, vulnerabilities & protection</link>
<description>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Cyber Security News</description>
<dc:language>en</dc:language>
<dc:rights></dc:rights>

<item>
<title>Urgent Alert on the Microsoft Exchange Server Zero&amp;Day (CVE&amp;2026&amp;42897)</title>
<link>https://blog.roxohost.com/urgent-alert-on-the-microsoft-exchange-server-zero-day-cve-2026-42897</link>
<guid>https://blog.roxohost.com/urgent-alert-on-the-microsoft-exchange-server-zero-day-cve-2026-42897</guid>
<description><![CDATA[ Actively exploited Microsoft Exchange Server Zero-Day (CVE-2026-42897) alert. Get immediate mitigation steps and protect your network with Mister Red ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202605/image_750x_6a0834bdcb9a6.jpg" length="71080" type="image/jpeg"/>
<pubDate>Sat, 16 May 2026 14:51:08 +0530</pubDate>
<dc:creator>misterRed</dc:creator>
<media:keywords>CVE-2026-42897, Microsoft Exchange, Zero-Day, XSS vulnerability, RoxoHost security, Mister Red, Cyber Security</media:keywords>
</item>

<item>
<title>Massive Attacks Targeting Cisco SD&amp;WAN Controllers: Everything You Need to Know About CVE&amp;2026&amp;20182 &amp;amp; Other Vulnerabilities</title>
<link>https://blog.roxohost.com/massive-attacks-targeting-cisco-sd-wan-controllers-everything-you-need-to-know-about-cve-2026-20182-other-vulnerabilities</link>
<guid>https://blog.roxohost.com/massive-attacks-targeting-cisco-sd-wan-controllers-everything-you-need-to-know-about-cve-2026-20182-other-vulnerabilities</guid>
<description><![CDATA[ Learn about the critical CVE-2026-20182 authentication bypass vulnerability in Cisco SD-WAN Controllers and how it is being exploited by hackers ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202605/image_750x_6a0735e3e9308.jpg" length="91364" type="image/jpeg"/>
<pubDate>Fri, 15 May 2026 20:49:45 +0530</pubDate>
<dc:creator>misterRed</dc:creator>
<media:keywords>CVE-2026-20182, Cisco SD-WAN, Bug Hunting, Cybersecurity, Zero-Day, Authentication Bypass</media:keywords>
</item>

<item>
<title>Google Patches Actively Exploited Chrome Zero&amp;Day (CVE&amp;2026&amp;2441) – Users Urged to Update Immediately</title>
<link>https://blog.roxohost.com/google-patches-actively-exploited-chrome-zero-day-cve-2026-2441-users-urged-to-update-immediately</link>
<guid>https://blog.roxohost.com/google-patches-actively-exploited-chrome-zero-day-cve-2026-2441-users-urged-to-update-immediately</guid>
<description><![CDATA[ Google has released urgent security updates for Chrome to fix CVE-2026-2441, a high-severity zero-day vulnerability actively exploited in the wild. Users are advised to update to the latest browser version immediately. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202602/image_750x_6992d6e6aac20.jpg" length="93801" type="image/jpeg"/>
<pubDate>Mon, 16 Feb 2026 14:01:20 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Google Chrome zero-day, CVE-2026-2441, Chrome security update 2026, use-after-free vulnerability, Chrome CSS bug, actively exploited vulnerability, browser security, Chrome 145 update, cybersecurity news 2026</media:keywords>
</item>

<item>
<title>Clickjacking: A Low&amp;Severity Bug in Reports, a High&amp;Risk Threat in the Real World</title>
<link>https://blog.roxohost.com/clickjacking-a-low-severity-bug-in-reports-a-high-risk-threat-in-the-real-world</link>
<guid>https://blog.roxohost.com/clickjacking-a-low-severity-bug-in-reports-a-high-risk-threat-in-the-real-world</guid>
<description><![CDATA[ Clickjacking is rated P5 in bug bounties but becomes a real-world P1 threat when abused to access cameras, permissions, and user privacy. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202602/image_750x_6989cfbbd06de.jpg" length="90979" type="image/jpeg"/>
<pubDate>Mon, 09 Feb 2026 17:45:04 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>clickjacking vulnerability, clickjacking attack, browser security, web security risk, camera permission abuse, cybersecurity threats, bug bounty severity, real world cyber attacks, RoxoHost security</media:keywords>
</item>

<item>
<title>Germany Warns of Signal Account Hijacking Attacks Targeting Politicians &amp;amp; Journalists</title>
<link>https://blog.roxohost.com/germany-warns-of-signal-account-hijacking-attacks-targeting-politicians-journalists</link>
<guid>https://blog.roxohost.com/germany-warns-of-signal-account-hijacking-attacks-targeting-politicians-journalists</guid>
<description><![CDATA[ Germany’s intelligence agencies have warned of sophisticated phishing attacks abusing Signal’s legitimate features to spy on politicians, military officials, diplomats, and journalists across Europe—without using malware. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202602/image_750x_698721a917b00.jpg" length="85658" type="image/jpeg"/>
<pubDate>Sat, 07 Feb 2026 12:11:46 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>ignal phishing attack, Germany BfV warning, Signal account hijacking, Signal linked device attack, QR code phishing Signal, WhatsApp QR phishing, state-sponsored cyber attacks, messaging app espionage</media:keywords>
</item>

<item>
<title>World’s Largest DDoS Attack Recorded: 31.4 Tbps Aisuru/Kimwolf Botnet Strikes</title>
<link>https://blog.roxohost.com/worlds-largest-ddos-attack-recorded-314-tbps-aisurukimwolf-botnet-strikes</link>
<guid>https://blog.roxohost.com/worlds-largest-ddos-attack-recorded-314-tbps-aisurukimwolf-botnet-strikes</guid>
<description><![CDATA[ The Aisuru/Kimwolf botnet launched the largest DDoS attack ever recorded, peaking at 31.4 Tbps. Learn how the “Night Before Christmas” campaign targeted Cloudflare, its impact on global infrastructure, and what it means for cybersecurity. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_697ca035ea64c.jpg" length="105560" type="image/jpeg"/>
<pubDate>Fri, 30 Jan 2026 17:40:35 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>31.4 Tbps DDoS attack, largest DDoS attack in history, Aisuru botnet, Kimwolf botnet, Cloudflare DDoS attack, hyper volumetric DDoS, Android TV botnet, network layer DDoS, HTTP flood attack, DDoS mitigation</media:keywords>
</item>

<item>
<title>Malicious Fake Moltbot VS Code Extension Found Dropping Remote Access Malware</title>
<link>https://blog.roxohost.com/malicious-fake-moltbot-vs-code-extension-found-dropping-remote-access-malware</link>
<guid>https://blog.roxohost.com/malicious-fake-moltbot-vs-code-extension-found-dropping-remote-access-malware</guid>
<description><![CDATA[ Cybersecurity researchers have uncovered a fake Moltbot (formerly Clawdbot) Visual Studio Code extension that posed as an AI coding assistant but secretly installed malware, giving attackers persistent remote access. The extension was removed from the official VS Code Marketplace after discovery. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_697b0d92a0bc6.jpg" length="95366" type="image/jpeg"/>
<pubDate>Thu, 29 Jan 2026 13:01:36 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Moltbot malware, fake VS Code extension, Clawdbot security risk, malicious VS Code plugin, AI coding assistant scam, ScreenConnect malware, developer security threat, supply chain attack, infostealer malware</media:keywords>
</item>

<item>
<title>Pakistan&amp;Linked Cyber Campaigns Target Indian Government Using Google Sheets &amp;amp; Fake Adobe Updates</title>
<link>https://blog.roxohost.com/pakistan-linked-cyber-campaigns-target-indian-government-using-google-sheets-fake-adobe-updates</link>
<guid>https://blog.roxohost.com/pakistan-linked-cyber-campaigns-target-indian-government-using-google-sheets-fake-adobe-updates</guid>
<description><![CDATA[ Indian government entities have been targeted by two sophisticated cyber-espionage campaigns, dubbed Gopher Strike and Sheet Attack, attributed to a Pakistan-linked threat actor. The attacks leverage phishing emails, fake Adobe update prompts, and trusted platforms like Google Sheets and GitHub to deploy custom Golang-based malware, enabling persistent access and remote command execution on infected systems. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_6979ad342986d.jpg" length="101690" type="image/jpeg"/>
<pubDate>Wed, 28 Jan 2026 12:01:48 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Pakistan cyber attack, Indian government cyber attack, Gopher Strike, Sheet Attack, APT36, Golang malware, fake Adobe update attack, phishing campaign India, Google Sheets C2, GitHub malware, cyber espionage India, Zscaler ThreatLabz, advanced persistent threat</media:keywords>
</item>

<item>
<title>Massive 149M Credentials Leak Discovered – Gmail, Facebook, Instagram &amp;amp; Government Accounts Exposed</title>
<link>https://blog.roxohost.com/massive-149m-credentials-leak-discovered-gmail-facebook-instagram-government-accounts-exposed</link>
<guid>https://blog.roxohost.com/massive-149m-credentials-leak-discovered-gmail-facebook-instagram-government-accounts-exposed</guid>
<description><![CDATA[ A 149 million credentials database, including Gmail, Facebook, Instagram, and government accounts, was found exposed in an unprotected cloud repository. Learn how the breach happened, who’s affected, and steps to stay safe. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69774799c1dcf.jpg" length="103311" type="image/jpeg"/>
<pubDate>Mon, 26 Jan 2026 16:20:09 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>credentials leak, data breach, Gmail hack, Facebook hack, Instagram hack, government accounts exposed, infostealer malware, cyber security, exposed passwords, credential-stuffing</media:keywords>
</item>

<item>
<title>Critical Zoom Node Vulnerability Allows Remote Code Execution (CVE&amp;2026&amp;22844)</title>
<link>https://blog.roxohost.com/critical-zoom-node-vulnerability-allows-remote-code-execution-cve-2026-22844</link>
<guid>https://blog.roxohost.com/critical-zoom-node-vulnerability-allows-remote-code-execution-cve-2026-22844</guid>
<description><![CDATA[ A newly disclosed critical vulnerability in Zoom Node Multimedia Routers (MMRs) allows authenticated meeting participants to execute arbitrary commands remotely. Tracked as CVE-2026-22844 with a CVSS score of 9.9, the flaw affects Zoom Node deployments running versions prior to 5.2.1716.0 and requires immediate patching. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69721aa8e8e49.jpg" length="87394" type="image/jpeg"/>
<pubDate>Thu, 22 Jan 2026 18:10:44 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Zoom vulnerability, CVE-2026-22844, Zoom Node MMR flaw, Zoom command injection, Zoom security issue, remote code execution Zoom, critical CVE 2026, Zoom hybrid meetings vulnerability</media:keywords>
</item>

<item>
<title>Multi&amp;Stage Windows Malware Abuses Cloud Services to Disable Microsoft Defender</title>
<link>https://blog.roxohost.com/multi-stage-windows-malware-abuses-cloud-services-to-disable-microsoft-defender</link>
<guid>https://blog.roxohost.com/multi-stage-windows-malware-abuses-cloud-services-to-disable-microsoft-defender</guid>
<description><![CDATA[ Security researchers have uncovered a sophisticated Windows malware campaign that relies on social engineering, malicious shortcuts, and abused cloud services like GitHub and Dropbox to bypass Microsoft Defender and deploy ransomware, RATs, and banking trojans without exploiting software vulnerabilities. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69721575492fc.jpg" length="99174" type="image/jpeg"/>
<pubDate>Thu, 22 Jan 2026 17:42:51 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Windows malware, Microsoft Defender bypass, multi-stage malware, PowerShell attack, malicious LNK files, ransomware attack, Amnesia RAT, WinLocker, Hakuna Matata ransomware, cloud abuse malware</media:keywords>
</item>

<item>
<title>North Korean Hackers Abuse VS Code Projects to Deploy Stealthy Backdoors</title>
<link>https://blog.roxohost.com/north-korean-hackers-abuse-vs-code-projects-to-deploy-stealthy-backdoors</link>
<guid>https://blog.roxohost.com/north-korean-hackers-abuse-vs-code-projects-to-deploy-stealthy-backdoors</guid>
<description><![CDATA[ North Korean threat actors linked to the Contagious Interview campaign are using malicious VS Code projects to deploy backdoors, steal data, and gain remote access to developer systems. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69706d3217079.jpg" length="95165" type="image/jpeg"/>
<pubDate>Wed, 21 Jan 2026 11:38:19 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>North Korea hackers, Contagious Interview campaign, VS Code malware, malicious GitHub repository, developer cyber attack, BeaverTail malware, InvisibleFerret, VS Code tasks abuse, DPRK cyber espionage, supply chain attack</media:keywords>
</item>

<item>
<title>Remcos RAT Uses Fileless PowerShell Attacks to Evade Detection</title>
<link>https://blog.roxohost.com/remcos-rat-uses-fileless-powershell-attacks-to-evade-detection</link>
<guid>https://blog.roxohost.com/remcos-rat-uses-fileless-powershell-attacks-to-evade-detection</guid>
<description><![CDATA[ A new Remcos RAT campaign is using fileless PowerShell techniques to bypass security defenses and gain persistent remote access to infected systems ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_696e1facc520b.jpg" length="77101" type="image/jpeg"/>
<pubDate>Mon, 19 Jan 2026 17:43:09 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Remcos RAT, fileless malware, PowerShell attack, remote access trojan, Remcos malware 2026, RAT malware campaign, phishing malware, mshta.exe attack, process hollowing, cybersecurity threats</media:keywords>
</item>

<item>
<title>Mouse Jacking: The Silent Cyber Attack You Never See</title>
<link>https://blog.roxohost.com/mouse-jacking</link>
<guid>https://blog.roxohost.com/mouse-jacking</guid>
<description><![CDATA[ What&#039;s Mouse-jacking and why its devastating. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_696d9b2581ad3.jpg" length="107612" type="image/jpeg"/>
<pubDate>Mon, 19 Jan 2026 08:05:51 +0530</pubDate>
<dc:creator>Sujith</dc:creator>
<media:keywords>mousejacking attack, mouse jacking cyber attack, wireless mouse hacking, 2.4GHz mouse vulnerability, USB receiver hacking, HID attack, wireless keyboard injection, cyber security threats 2026, mousejacking vulnerability, logitech unifying vulnerability, keystroke injection attack, hardware hacking, wireless device security, cyber attack without malware, physical layer attacks</media:keywords>
</item>

</channel>
</rss>