Cloud Security Cyber Espionage3 Min Read February 13, 2026 UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the …
6 Min Read February 13, 2026 Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History Cybersecurity researchers have discovered a malicious Google Chrome… Artificial Intelligence Browser Security
4 Min Read February 13, 2026 npm’s Update to Harden Their Supply Chain, and Points to Consider In December 2025, in response to the Sha1-Hulud incident, npm completed… DevSecOps Supply Chain Security
18 Min Read February 12, 2026 ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories Threat activity this week shows one consistent signal — attackers… Cybersecurity Hacking News
Breach Prevention Enterprise Security3 Min Read February 12, 2026 The CTEM Divide: Why 84% of Security Programs Are Falling Behind A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between…
Network Security Vulnerability2 Min Read February 12, 2026 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be…
Patch Tuesday Vulnerability2 Min Read February 11, 2026 Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their…
Identity Security Threat Exposure3 Min Read February 11, 2026 Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools…
Vulnerability Windows Security5 Min Read February 11, 2026 Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said…
Botnet Linux3 Min Read February 11, 2026 SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC)…
Endpoint Security Malware5 Min Read February 10, 2026 Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring…
Identity Security Threat Intelligence6 Min Read February 10, 2026 From Ransomware to Residency: Inside the Rise of the Digital Parasite Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a…
Network Security Vulnerability1 Min Read February 10, 2026 Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code…
Application Security Artificial Intelligence3 Min Read February 10, 2026 ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the…
Endpoint Security Vulnerability3 Min Read February 9, 2026 SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed…
Cybersecurity Hacking News11 Min Read February 9, 2026 ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems…
Security Operations Threat Detection5 Min Read February 9, 2026 How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get…
Artificial Intelligence Vulnerability6 Min Read February 8, 2026 OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned VirusTotal to scan skills that are being…
Cyber Espionage Threat Intelligence4 Min Read February 7, 2026 German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for…
IoT Security Malware3 Min Read February 6, 2026 China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's…
Federal Security Infrastructure Security2 Min Read February 6, 2026 CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen…
Cyber Espionage Malware3 Min Read February 6, 2026 Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical…
Mobile Security Threat Detection3 Min Read February 6, 2026 How Samsung Knox Helps Stop Your Network Security Breach As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent,…
Developer Security Malware4 Min Read February 6, 2026 Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI)…
Artificial Intelligence Vulnerability2 Min Read February 6, 2026 Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500…
Botnet Network Security3 Min Read February 5, 2026 AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4…
Cybersecurity Hacking News11 Min Read February 5, 2026 ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look…
Artificial Intelligence SaaS Security5 Min Read February 5, 2026 The Buyer’s Guide to AI Usage Control Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms,…
Cyber Espionage Malware4 Min Read February 5, 2026 Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as…
Vulnerability Workflow Automation4 Min Read February 5, 2026 Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could…
Vulnerability Web Security3 Min Read February 5, 2026 Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and…
Artificial Intelligence Software Security3 Min Read February 4, 2026 Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and…
Endpoint Security Malware3 Min Read February 4, 2026 DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and…
Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement…
Identity Security Security Operations3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives…
Open Source Vulnerability2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular…
Cloud Computing Zero Trust4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have…
Malware Vulnerability3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed…
Artificial Intelligence Privacy2 Min Read February 3, 2026 Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative…
Cybersecurity Hacking News19 Min Read February 2, 2026 ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others…
Endpoint Security Threat Detection2 Min Read February 2, 2026 Securing the Mid-Market Across the Complete Threat Lifecycle For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an…
Malware Threat Intelligence2 Min Read February 2, 2026 Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to…
Endpoint Security Threat Intelligence3 Min Read February 2, 2026 eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been…
Developer Tools Malware3 Min Read February 2, 2026 Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors…
Artificial Intelligence Cyber Espionage5 Min Read January 31, 2026 Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental…
SaaS Security Social Engineering3 Min Read January 31, 2026 Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed…