Open Source Vulnerability2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" n…
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka… Malware Vulnerability
2 Min Read February 3, 2026 Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox Mozilla on Monday announced a new controls section in its Firefox… Artificial Intelligence Privacy
Cybersecurity Hacking News19 Min Read February 2, 2026 ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others…
Endpoint Security Threat Detection2 Min Read February 2, 2026 Securing the Mid-Market Across the Complete Threat Lifecycle For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an…
Malware Threat Intelligence2 Min Read February 2, 2026 Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to…
Endpoint Security Threat Intelligence3 Min Read February 2, 2026 eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been…
Developer Tools Malware3 Min Read February 2, 2026 Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors…
Artificial Intelligence Cyber Espionage5 Min Read January 31, 2026 Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental…
SaaS Security Social Engineering3 Min Read January 31, 2026 Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed…
Network Security SCADA3 Min Read January 31, 2026 CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic…
AI Security Malware6 Min Read January 30, 2026 Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal…
Cyber Espionage Server Security4 Min Read January 30, 2026 China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between…
Cybercrime Threat Intelligence10 Min Read January 30, 2026 Badges, Bytes and Blackmail Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and…
Artificial Intelligence Economic Espionage3 Min Read January 30, 2026 Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted…
Email Security Vulnerability2 Min Read January 30, 2026 SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in…
Enterprise Security Vulnerability3 Min Read January 30, 2026 Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited…
Artificial Intelligence LLM Security3 Min Read January 29, 2026 Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
ICS Security Operational Technology5 Min Read January 29, 2026 Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and…
Incident Response Threat Intelligence3 Min Read January 29, 2026 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any…
Software Security Vulnerability2 Min Read January 29, 2026 SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, including four…
Malware Threat Intelligence6 Min Read January 29, 2026 Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest…
AI Security Malware4 Min Read January 28, 2026 Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Critical Infrastructure Threat Intelligence3 Min Read January 28, 2026 Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian…
Vulnerability Workflow Automation2 Min Read January 28, 2026 Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability…
Artificial Intelligence Enterprise Security4 Min Read January 28, 2026 From Triage to Threat Hunts: How AI Accelerates SecOps If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors…
Open Source Vulnerability2 Min Read January 28, 2026 Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow…
Cyber Espionage Endpoint Security3 Min Read January 28, 2026 Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
Enterprise Security Password Security4 Min Read January 28, 2026 Password Reuse in Disguise: An Often-Missed Risky Workaround When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These…
Threat Intelligence Vulnerability3 Min Read January 28, 2026 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a…
Network Security Vulnerability2 Min Read January 1, 2026 RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers Cybersecurity researchers have disclosed details of a persistent nine-month-long campaign that has targeted Internet of Things (IoT) devices…
Technology Web Browser3 Min Read January 1, 2026 How To Browse Faster and Get More Done Using Adapt Browser As web browsers evolve into all-purpose platforms, performance and productivity often suffer. Feature overload, excessive background…
Data Breach Software Security3 Min Read December 31, 2025 Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was…
Ad Fraud Malware3 Min Read December 31, 2025 DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…
API Security Vulnerability1 Min Read December 31, 2025 IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The…
Cybersecurity Malware3 Min Read December 31, 2025 Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
Mobile Security Spyware3 Min Read December 31, 2025 U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa…
Email Security Vulnerability2 Min Read December 30, 2025 CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail…
Malware Phishing3 Min Read December 30, 2025 Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
Artificial Intelligence Threat Hunting7 Min Read December 30, 2025 How to Integrate AI into Modern SOC Workflows Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early…
Cyber Espionage Malware4 Min Read December 30, 2025 Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant…
Cybersecurity Hacking News17 Min Read December 29, 2025 ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
Database Security Vulnerability2 Min Read December 29, 2025 MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…