Cyber - 2026-02-03 - EVE
##
Symantec Enterprise Blogs
View Articles
743 - Search - Internet of Things (IoT) security(3)
744 - Search - Microsoft Defender for Office 365(31)
745 - Search - Microsoft Defender for Cloud Apps(19)
746 - Search - Microsoft Defender External Attack Surface Management(4)
747 - Search - Microsoft Defender Experts for XDR(7)
748 - Search - Microsoft Defender Experts for Hunting(7)
749 - Search - Cloud C² — Command & Control
750 - Search - Essential, Elite and Red Team
751 - Search - Terms of Service & Policies
752 - Search - PAYLOAD AWARDSGet your payload in front of thousands and enter to win. Nearly $10,000 in annual Hak5 prizes!
753 - Search - DUCKYSCRIPT COURSELearn directly from the creators! Unlock your creative potential with this comprehensive course.
754 - Search - only for BIS license exception ENC favorable treatment countries
755 - Search - English: Europe, Middle East, Africa
756 - Search - See why Proofpoint is a leader
757 - Search - Combat Email and Cloud Threats
758 - Search - Proofpoint vs. Check Point Harmony
759 - Search - Cybersecurity in 2026: Agentic AI, Cloud Chaos, and the Human Factor
760 - Search - Proofpoint Celebrates 2025 Global Partner Award Winners at Annual Flagship Event
761 - Search - Inside the Mind of Today’s CISO: Key Insights from Proofpoint’s 2025 Voice of the CISO Report
762 - Search - Q1 Business Momentum Cements Proofpoint’s Position as Undisputed Leader in Human-Centric Security
763 - Search - DIY AI bot farm OpenClaw is a security ‘dumpster fire’Your own personal Jarvis. A bot to hear your prayers. A bot that cares. Just not about keeping you safe
764 - Search - Russia-linked APT28 attackers already abusing new Microsoft Office zero-dayUkraine’s CERT says the bug went from disclosure to active exploitation in days
765 - Search - Notepad++ update service hijacked in targeted state-linked attackBreach lingered for months before stronger signature checks shut the door
766 - Search - StopICE hacked to send alarming text messages, admins accuse border patrol agent of sabotageThe ICE-tracking service says it doesn’t store usernames or addresses
767 - Search - Sudo maintainer, handling utility for more than 30 years, is looking for supportMany vital open source resources rely on the devotion of a few individualsOSes03 Feb 2026|5
768 - Search - GitHub ponders kill switch for pull requests to stop AI slopCode community site begins to see that AI could drive people awayAI + ML03 Feb 2026|2
769 - Search - Amazon’s European datacenter buildout blows a breaker as grid connection wait list hits 7 yearsE-commerce giant has watts of bit barns to deploy but nowhere to plug them inPaaS + IaaS03 Feb 2026|4
770 - Search - ‘Lethal’ and ‘magical’ Palantir tech is in demand by Pentagon, China, Middle East, CEO saysLess popular in Canada and Northern EuropePublic Sector03 Feb 2026|3
771 - Search - Critical React Native Metro dev server bug under attack as researchers scream into the voidToo slow react-ion timePatches03 Feb 2026|1
772 - Search - Next-gen nuclear reactors safe enough to skip full environmental reviews, says Trump adminDoE trims NEPA paperwork for advanced reactorsPublic Sector03 Feb 2026|25
773 - Search - Snowflake plugs PostgreSQL into its AI Data CloudYes, it already had UnistoreDatabases03 Feb 2026|
774 - Search - CISA updated ransomware intel on 59 bugs last year without telling defendersGreyNoise’s Glenn Thorpe counts the cost of missed opportunitiesCSO03 Feb 2026|2
775 - Search - Palantir declares itself the guardian of Americans’ rightsOpinionCEO Alex Karp meets criticism with soaring revenues and a sermonApplications03 Feb 2026|18
776 - Search - Azure outages ripple across multiple dependent Microsoft servicesManaged Identity and virtual machine failures triggered knock-on problems throughout cloud platformPaaS + IaaS03 Feb 2026|3
777 - Search - Europe shrugs off tariffs, plots to end tech reliance on USGovernments and businesses respond to Trump pressures by upping spending in domestically controlled infrastructureOn-Prem03 Feb 2026|41
778 - Search - HP CEO prints final page after six years, moves to PayPalMultimillion-dollar tenure could have bought a couple of crates of tonerPersonal Tech03 Feb 2026|10
779 - Search - Techie’s one ring brought darkness by shorting a serverWho, Me?Love hurts, but being exposed is more painful
780 - Search - X marks the raid: French cops swoop on Musk’s Paris opsAlgorithmic bias probe continues, CEO and former boss summoned to defend the platform’s cornerSecurity03 Feb 2026|50
781 - Search - Microsoft finally sends TLS 1.0 and 1.1 to the cloud retirement homeAzure Storage now requires version 1.2 or newer for encrypted connectionsStorage03 Feb 2026|3
782 - Search - Polish cops bail 20-year-old bedroom botnet operatorDDoSer of ‘strategically important’ websites admitted to most chargesCyber-crime03 Feb 2026|2
783 - Search - UK names Barnsley as first Tech Town to see whether AI can fix… well, anythingAI-pocalypseSouth Yorkshire becomes ground zero for nationwide experiment with £500K seed fundingAI + ML03 Feb 2026|68
784 - Search - Firefox makes AI optional, like it probably should have been all alongUsers can disable every generative feature in one click – not everyone wants a chatbot bolted to their tabsSoftware03 Feb 2026|28
785 - Search - NASA delays Artemis II to March after hydrogen leaks bedevil countdown testThis is starting to sound oddly familiarScience03 Feb 2026|17
786 - Search - DIY AI bot farm OpenClaw is a security ‘dumpster fire’Your own personal Jarvis. A bot to hear your prayers. A bot that cares. Just not about keeping you safeSecurity03 Feb 2026|27
787 - Search - British military to get legal OK to swat drones near basesArmed Forces Bill would let troops take action against unmanned threats around defense sitesPublic Sector03 Feb 2026|44
788 - Search - Microsoft kills standalone SharePoint and OneDrive plans, because they’re not suite enoughBlames ‘unintended or nonstandard usage’ and the cost of keeping them aliveOff-Prem03 Feb 2026|22
789 - Search - South Korea enlists AI to spot pump and dump schemes on social media, or in SpamMain stock exchange targets shares, government agency looks for crypto crooksPublic Sector03 Feb 2026|3
790 - Search - Elon Musk merges xAI into SpaceX to spread universal consciousness via a sentient sunBurning Man woo woo values House of Grok at $250 billionOffbeat03 Feb 2026|95
791 - Search - In-house techies fixed faults before outsourced help even noticed they’d happenedOn Call60-minute SLA was effectively useless and the contractor admitted it
792 - Search - Notepad++ hijacking blamed on Chinese Lotus Blossom crew behind Chrysalis backdoorThe group targets telecoms, critical infrastructure - all the usual high-value orgsCyber-crime02 Feb 2026|8
793 - Search - Let them eat Pi: RAM shortage bumps Raspberry prices as much as $60Second price increase in just two monthsPersonal Tech02 Feb 2026|26
794 - Search - Intel welcomes memory apocalypse with Xeon workstation refreshChipzilla touts 4 TB of DDR5 and 128 lanes of PCIe 5 for less than the House of Zen just in time for memory winterSystems02 Feb 2026|5
795 - Search - There’s nothing micro about this super-sized Arduino UnoIt’s 7x the size of the regular boardOffbeat02 Feb 2026|9
796 - Search - Want more ads on your web pages? Try the AdBoost extension’If we don’t feed the advertisers, then we’ll be forced to pay artists for their creative work’Offbeat02 Feb 2026|16
797 - Search - DRAM prices expected to double in Q1 as AI ambitions push memory fabs to their limitNAND flash now expected to surge 55–60% compared to Q4Storage02 Feb 2026|15
798 - Search - StopICE hacked to send alarming text messages, admins accuse border patrol agent of sabotageThe ICE-tracking service says it doesn’t store usernames or addressesSecurity02 Feb 2026|40
799 - Search - Robotics will break AI infrastructure: Here’s what comes nextRobotics is forcing a fundamental rethink of AI compute, data, and systems designPartner Content
800 - Search - Russia-linked APT28 attackers already abusing new Microsoft Office zero-dayUkraine’s CERT says the bug went from disclosure to active exploitation in daysCyber-crime02 Feb 2026|10
801 - Search - Oracle’s first general on-prem release of its .ai database iteration draws skepticsUsers happy with 19c as experts question AI lock-inDatabases02 Feb 2026|2
802 - Search - McDonald’s is not lovin’ your bigmac, happymeal, and mcnuggets passwordsYour favorite menu item might be easy to remember but it will not secure your accountSecurity02 Feb 2026|48
803 - Search - Snowflake bets $200M that OpenAI makes databases more chattyCuts out the Azure middleman with multi-year deal for ’tighter alignment’AI + ML02 Feb 2026|4
804 - Search - Patch Tuesday meets Groundhog Day as Windows hibernation bug returnsMicrosoft concedes January’s out-of-band fix didn’t stop some PCs from rebooting instead of sleepingOSes02 Feb 2026|16
805 - Search - SAP refuses to budge on renewal discounts despite cloud growth slowdownDrop in customers’ cloud conversion rate causes share price to plunge 22% – steepest decline since 2020Databases02 Feb 2026|4
806 - Search - Why native cloud security falls shortYour cloud security must stand alonePartner Content
807 - Search - OpenClaw patches one-click RCE as security Whac-A-Mole continuesResearchers disclose rapid exploit chain that let attackers run code via a single malicious web pageSecurity02 Feb 2026|2
808 - Search - Microsoft spends billions on AI, converts just 3.3% of Copilot Chat usersCEO talks momentum while paid uptake remains minimalAI + ML02 Feb 2026|57
809 - Search - Notepad++ update service hijacked in targeted state-linked attackBreach lingered for months before stronger signature checks shut the doorCyber-crime02 Feb 2026|54
810 - Search - US TikTok service restored after cloud ’that doesn’t go down’ went downWinter storm knocks out Oracle datacenter, despite Larry Ellison’s reliability boastsOn-Prem02 Feb 2026|14
811 - Search - Microsoft’s Sinofsky saw Surface fail coming – then hit up Epstein for advice on exitDOJ files show former Windows chief predicting a public flop before mulling next missionPersonal Tech02 Feb 2026|32
812 - Search - Help! Does anyone on the bus know Linux?Bork!Bork!Bork!Open source operating system fans, your time has comeOffbeat02 Feb 2026|49
813 - Search - Infrastructure cyberattacks are suddenly in fashion. We can buck the trendOpinionDon’t be scared of the digital dark – learn how to keep the lights onCyber-crime02 Feb 2026|8
814 - Search - Microsoft’s ‘atypical’ emergency Windows patches are becoming awfully typicalOpinionAdministrators sigh: OOBs, they did it againOSes02 Feb 2026|48
815 - Search - Capgemini to sell the biz that works for US government amid criticism of ICE contract’The nature and scope of this work has raised questions’ says CEO, who swears he couldn’t spot it soonerPublic Sector02 Feb 2026|43
816 - Search - Oracle expects investors to pump $50 billion into its cloud this year aloneBig Red will use debt and equity finance to keep itself in the pinkOff-Prem02 Feb 2026|21
817 - Search - India dangles 20-year tax holiday for clouds that serve offshore usersAsia In BriefPLUS: NTT offshores to Vietnam; Japan adds AI interface to space data; Samsung cashes in on memory boomPublic Sector02 Feb 2026|3
818 - Search - Open-source AI is a global security nightmare waiting to happen, say researchersInfosec in BriefAlso, South Korea gets a pentesting F, US Treasury says bye bye to BAH, North Korean hackers evolve, and moreSecurity01 Feb 2026|15
819 - Search - The AI PC needs to deliver more than performance - it needs to deliver securityScanning the future
820 - Search - Liquid cooling means more performance and less heat for supercomputingHow Lenovo Neptune became the cooling technology behind the world’s greenest supercomputers
821 - Search - What Do You Do When You Want GPFS On The Cloud?Sycomp now provides managed GPFS services on demand
822 - Search - Building the future-ready datacentreTomorrow’s datacentre won’t be like yesterday’s. Here’s why.
823 - Search - AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues.‘I did not think it was going to happen to me, but here we are’CSO01 Feb 2026|52
824 - Search - Sword of Damocles hangs over UK military’s Ajax as minister says back it or scrap itArmored vehicle trials halted after troops report noise and vibration symptomsPublic Sector01 Feb 2026|88
825 - Search - NASA taps Claude to conjure Mars rover’s travel planIs there life on Mars? Well, there’s Claude in the machineScience31 Jan 2026|20
826 - Search - Broadcom ‘bulldozes’ VMware cloud partners as March deadline loomsexclusiveMany European CSPs are being cut loose, sources say, forcing customer transitionsVirtualization31 Jan 2026|55
827 - Search - January blues return as Ivanti coughs up exploited EPMM zero-daysConsider yourselves compromised, experts warnSecurity30 Jan 2026|4
828 - Search - ‘Hey! I’m chatting here!’ Fugazi answers doom NYC’s AI botLying means dyingAI + ML30 Jan 2026|22
829 - Search - Ex-Googler nailed for stealing AI secrets for Chinese startupsNetwork access from China and side hustle as AI upstart CEO aroused suspicionLegal30 Jan 2026|17
830 - Search - Seven habits that help security teams reduce risk without slowing deliveryThe right habits change everythingSponsored Post
831 - Search - Thousands more Oregon residents learn their health data was stolen in TriZetto breachParent company Cognizant hit with multiple lawsuitsCyber-crime30 Jan 2026|11
832 - Search - Feeling taxed by layoffs, IRS turns to AI helpersFewer humans, more bots - just in time for filing seasonPublic Sector30 Jan 2026|9
833 - Search - Backblaze says AI traffic and neoclouds could shape future networksThe western US saw the most activity overallNetworks30 Jan 2026|
834 - Search - Oracle seeks to build bridges with MySQL developersBig Red promises ’new era’ as long-frustrated contributors weigh whether to believe itDatabases30 Jan 2026|17
835 - Search - Autonomous cars, drones cheerfully obey prompt injection by road signAI vision systems can be very literal readersAI + ML30 Jan 2026|116
836 - Search - Want digital sovereignty? That’ll be 1% of your GDP into AI infrastructure pleaseAnalyst predicts massive spend on domestic AI stacksOn-Prem30 Jan 2026|25
837 - Search - OpenAI gives ChatGPT models the chop – two weeks’ notice, take it or leave itGPT-4o gets second death sentence after last year’s reprieve, but this time barely anyone’s botheredAI + ML30 Jan 2026|25
838 - Search - Phones down, brooms up: HashiCorp co-founder lectures business hopefulsStock management also important, says Mitchell HashimotoOffbeat30 Jan 2026|9
839 - Search - Euro firms must ditch Uncle Sam’s clouds and go EU-nativeOpinionJust because you’re paranoid about digital sovereignty doesn’t mean they’re not after youOff-Prem30 Jan 2026|185
840 - Search - BOFH: Eight pints of a lager and a management breakthroughEpisode 2The Boss has been on a retreat, which means he needs a factory reset ASAPBOFH30 Jan 2026|90
841 - Search - Mechanical mutts make it official: Now full-time at Sellafield’s hot zonesBark!Bark!Bark!Spot’s new cleanup gig involves gamma rays, alpha particles, and considerably less PPE than fleshy colleaguesScience30 Jan 2026|40
842 - Search - NS&I’s IT car crash considers cutting legacy links to stop the bleeding£1.3B over budget and four years late, bank searches for a way to not to bust new timetable and funding potPublic Sector30 Jan 2026|58
843 - Search - Java developers want container security, just not the job that comes with itBellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselvesDevops30 Jan 2026|17
844 - Search - Maybe CISA should take its own advice about insider threats hmmm?opinionThe call is coming from inside the houseSecurity29 Jan 2026|6
845 - Search - To stop crims, Google starts dismantling residential proxy network they use to hideThe Chocolate Factory strikes again, targeting the infrastructure attackers use to stay anonymousCyber-crime29 Jan 2026|18
846 - Search - AV vendor goes to war with security shop over update server scareeScan lawyers up after Morphisec claimed ‘critical supply-chain compromise’Security29 Jan 2026|1
847 - Search - ShinyHunters swipes right on 10M records in alleged dating app data grabExtortion crew says it’s found love in someone else’s info as Match Group plays down the impactCyber-crime29 Jan 2026|1
848 - Search - Patch or perish: Vulnerability exploits now dominate intrusionsApply fixes within a few hours or face the music, say the prosSecurity29 Jan 2026|8
849 - Search - Cyberattack on Poland’s power grid could have turned deadly in winter coldClose call after an apparently deliberate attempt to starve a country of energy at the worst timeCyber-crime29 Jan 2026|8
850 - Search - Ransomware crims forced to take off-RAMP as FBI seizes forumCybercrime solved. The endCyber-crime28 Jan 2026|1
851 - Search - Everybody is WinRAR phishing, dropping RATs as fast as lightningRussians, Chinese spies, run-of-the-mill crims …Cyber-crime28 Jan 2026|27
852 - Search - Fortinet unearths another critical bug as SSO accounts borked post-patchMore work for admins on the cards as they await a full dump of fixesSecurity28 Jan 2026|3
853 - Search - Old Windows quirks help punch through new admin defensesGoogle researcher sits on UAC bypass for ages, only for it to become valid with new security featureSecurity28 Jan 2026|12
854 - Search - Paranoid WhatsApp users rejoice: Encrypted app gets one-click privacy toggleMeta also replaces a legacy C++ media-handling security library with RustSecurity27 Jan 2026|35
855 - Search - Let them eat sourdough: ShinyHunters claims Panera Bread as stolen credentials victimPlus, the gang says it got in via Microsoft Entra SSOCyber-crime27 Jan 2026|3
856 - Search - China-linked group accused of spying on phones of UK prime ministers’ aides – for yearsReports say Salt Typhoon attackers accessed handsets of senior govt folkCyber-crime27 Jan 2026|31
857 - Search - France to replace US videoconferencing wares with unfortunately named sovereign alternativeFrench govt says state-run service ‘Visio’ will be more secure. Now where have we heard that name before?Software27 Jan 2026|98
858 - Search - Microsoft illegally installed cookies on schoolkid’s tech, data protection ruling findsUpdatedAustrian education ministry unaware of tracking software until campaigners launched caseApplications27 Jan 2026|17
859 - Search - High Court to grill London cops over live facial recognition creepVictim and Big Brother Watch will argue the Met’s policies are incompatible with human rights lawSecurity27 Jan 2026|28
860 - Search - Office zero-day exploited in the wild forces Microsoft OOB patchUpdatedAnother actively abused Office bug, another emergency patch – Office 2016 and 2019 users are left with registry tweaks instead of fixes.Security27 Jan 2026|6
861 - Search - Canva among ~100 targets of ShinyHunters Okta identity-theft campaignAtlassian, RingCentral, ZoomInfo also among tech targetsCyber-crime26 Jan 2026|3
862 - Search - EU looking into Elon Musk’s X after Grok produces deepfake sex imagesProbe follows outcry over use of creepy image generation toolPersonal Tech26 Jan 2026|27
863 - Search - Data thieves borrow Nike’s ‘Just Do It’ mantra, claim they ran off with 1.4TBUS sports brand launches probe after extortion crew WorldLeaks claims it stole huge datasetCyber-crime26 Jan 2026|4
864 - Search - Moscow likely behind wiper attack on Poland’s power grid, experts sayCyber sleuths believe Sandworm up to its old tricks with a brand-new sabotage toyCyber-crime26 Jan 2026|38
865 - Search - Oracle AI sailed the world on Royal Navy flagship via cloud-at-the-edge kitBig Red says ‘sovereign’ platform supports decision-making and operational learning at seaAI + ML26 Jan 2026|34
866 - Search - UK digital ID goes in-house, government swears it isn’t an ID cardMinister dodges cost questions while promising smartphone-free access and ‘robust’ verificationPublic Sector26 Jan 2026|84
867 - Search - Pwn2Own Automotive 2026 uncovers 76 zero-days, pays out more than $1Minfosec in briefAlso, cybercriminals get breached, Gemini spills the calendar beans, and moreSecurity25 Jan 2026|7
868 - Search - UK border tech budget swells by £100M as Home Office targets small boat crossingsDrone, satellite, and other data combined to monitor unwanted vesselsPublic Sector24 Jan 2026|26
869 - Search - Feds totally skipping infosec industry’s biggest conference this yearupdatedBut ex-CISA boss and new RSAC CEO Jen Easterly will be thereSecurity24 Jan 2026|7
870 - Search - Patch or die: VMware vCenter Server bug fixed in 2024 under attack todayIf you skipped it back then, now’s a very good timePatches23 Jan 2026|7
871 - Search - Surrender as a service: Microsoft unlocks BitLocker for fedsupdatedIf you’re serious about encryption, keep control of your encryption keysSecurity23 Jan 2026|77
872 - Search - ShinyHunters claims Okta customer breaches, leaks data belonging to 3 orgs’A lot more’ victims to come, we’re toldCyber-crime23 Jan 2026|6
873 - Search - AI-powered cyberattack kits are ‘just a matter of time,’ warns Google execSecurity chief says criminals are already automating workflows, with full end-to-end tools likely within yearsCSO23 Jan 2026|10
874 - Search - Fortinet admits FortiGate SSO bug still exploitable despite December patchFix didn’t quite do the job – attackers spotted logging inCSO23 Jan 2026|3
875 - Search - London boroughs limping back online months after cyberattackDirect debits? Maybe February. Birth certificates? Dream on. Council tax bills? Oh, those are comingCyber-crime23 Jan 2026|12
876 - Search - Marching orders delayed: Veterans’ Digital ID off to a slow startMuch owed to the few, but takeup is under 1%Public Sector23 Jan 2026|66
877 - Search - Crims hit the easy button for Scattered-Spider style helpdesk scamsTeach a crook to phish…Cyber-crime22 Jan 2026|
878 - Search - Crims compromised energy firms’ Microsoft accounts, sent 600 phishing emailsLogging in, not breaking inCyber-crime22 Jan 2026|2
879 - Search - FortiGate firewalls hit by silent SSO intrusions and config theftAdmins say attackers are still getting in despite recent patchesCyber-crime22 Jan 2026|4
880 - Search - Europe’s GDPR cops dished out €1.2B in fines last year as data breaches piled upRegulators logged over 400 personal data breach notifications a day for first time since law came into forceSecurity22 Jan 2026|7
881 - Search - Bank of England: Financial sector failing to implement basic cybersecurity controlsMind the cyber gap – similar flaws highlighted multiple years in a rowSecurity22 Jan 2026|5
882 - Search - Ancient telnet bug happily hands out root to attackersCritical vuln flew under the radar for a decadePatches22 Jan 2026|42
883 - Search - Another week, another emergency patch as Cisco plugs Unified Comms zero-dayThe critical-rated flaw leaves unpatched systems open to full takeoverNetworks22 Jan 2026|1
884 - Search - Davos discussion mulls how to keep AI agents from running wildWhere the shiny new FOMO object collides with insider-threat realitySecurity21 Jan 2026|10
885 - Search - Don’t click on the LastPass ‘create backup’ link - it’s a scamupdatedPhishing campaign tries to reel in master passwordsCyber-crime21 Jan 2026|20
886 - Search - Everest ransomware gang said to be sitting on mountain of Under Armour dataHave I Been Pwned reckons 72.7M customer accounts affected, sportswear firm remains silentCyber-crime21 Jan 2026|6
887 - Search - EU considers whether there’s Huawei of axing Chinese kit from networks within 3 yearsStill dominant in Germany’s networks, among othersNetworks21 Jan 2026|16
888 - Search - Ireland wants to give its cops spyware, ability to crack encrypted messagesIts very own Snooper’s Charter comes a month after proposed biometric tech expansionSecurity21 Jan 2026|34
889 - Search - Best of British: UK’s infosec envoys include Cisco, Palo Alto, and AccentureMinister unwraps ambassadors of the Software Security Code of PracticeSecurity21 Jan 2026|7
890 - Search - Curl shutters bug bounty program to remove incentive for submitting AI slopMaintainer hopes hackers send bug reports anyway, will keep shaming ‘silly’ onesSecurity21 Jan 2026|10
891 - Search - Cloudflare whacks WAF bypass bug that opened side door for attackersACME validation had a challenge-request holePatches20 Jan 2026|1
892 - Search - Remember VoidLink, the cloud-targeting Linux malware? An AI agent wrote itAI + skilled malware developers = security threatSecurity20 Jan 2026|4
893 - Search - AI framework flaws put enterprise clouds at risk of takeoverUpdate Chainlit to the latest version ASAPSecurity20 Jan 2026|4
894 - Search - Anthropic quietly fixed flaws in its Git MCP server that allowed for remote code executionPrompt injection for the winPatches20 Jan 2026|8
895 - Search - For the price of Netflix, crooks can now rent AI to run cybercrimeGroup-IB says crims forking out for Dark LLMs, deepfakes, and more at subscription pricesResearch20 Jan 2026|4
896 - Search - Akamai CEO wants help to defeat piracy, reckons he can handle edge AI aloneInterviewOG CDN boss says fighting illegal streams is about stopping criminals cashing in, not free speechLegal20 Jan 2026|12
897 - Search - Broker who sold malware to the FBI set for sentencingFeras Albashiti faces 10 years after $20,000 in sales to undercover agent exposed ransomware tiesCyber-crime19 Jan 2026|11
898 - Search - Don’t underestimate pro-Russia hacktivists, warns UK’s cyber crewThey’re not the most sophisticated, but even simple attacks can lead to costly consequencesCyber-crime19 Jan 2026|24
899 - Search - Windows 11 shutdown bug forces Microsoft into out-of-band damage controlShips emergency update to fix a Patch Tuesday misfire that prevented systems from switching offOSes19 Jan 2026|48
900 - Search - Ingram Micro admits summer ransomware raid exposed thousands of staff recordsMaine filing confirms July attack affected 42,521 employees and job applicantsCyber-crime19 Jan 2026|
901 - Search - UK prime minister stares down barrel of ban on social media for kidsLabour’s latest U-turn? 61 backbenchers pile pressure for Starmer to back Tory peer’s amendmentPublic Sector19 Jan 2026|81
902 - Search - Warwickshire school to reopen after cyberattack crippled ITKids return to classrooms after safety infrastructure knocked outCyber-crime19 Jan 2026|45
903 - Search - Royal Navy’s helicopter drone makes its first autonomous flightCapable of carrying 1-ton payload and key to strategy protecting North Atlantic from Russian submarinesPublic Sector19 Jan 2026|111
904 - Search - ATM maintenance tech broke the bank by forgetting to return a keyWho, Me?Bank staff wore the blame for a silly security slipSecurity19 Jan 2026|140
905 - Search - Microsoft hiring energy strategists to power its Asian datacentersAsia In BriefPLUS: ASUS gets into healthcare gadgets; Vietnam’s first fab; Australia’s child social ban takes out 4.7 million accounts; And more!Off-Prem19 Jan 2026|
906 - Search - Mandiant releases quick credential cracker, to hasten the death of a bad protocolInfosec In BriefPLUS: Navy spy sent to brig for 200 months; Black Axe busted again; Bill aims to crimp ICE apps; and moreSecurity18 Jan 2026|2
907 - Search - Fast Pair, loose security: Bluetooth accessories open to silent hijackSloppy implementation of Google spec leaves ‘hundreds of millions’ of devices vulnerableResearch17 Jan 2026|35
908 - Search - Sorry Dave, I’m afraid I can’t do that! PCs refuse to shut down after Microsoft patchMicrosoft claims it’s a Secure Launch bugPatches16 Jan 2026|113
909 - Search - German cops add Black Basta boss to EU most-wanted listRansomware kingpin who escaped Armenian custody is believed to be lying low back homeCyber-crime16 Jan 2026|1
910 - Search - RondoDox botnet linked to large-scale exploit of critical HPE OneView bugCheck Point observes 40K+ attack attempts in 4 hours, with government organizations under fireCyber-crime16 Jan 2026|2
911 - Search - Bankrupt scooter startup left one private key to rule them allOwner reverse-engineered his ride, revealing authentication was never properly individualizedSecurity16 Jan 2026|70
912 - Search - Probably not the best security in the world: Carlsberg wristbands spill visitor picsExclusiveResearcher shows how anyone can access Copenhagen experience attendees’ names, videosSecurity16 Jan 2026|9
913 - Search - Cisco finally fixes max-severity bug under active attack for weeksThis is a threat to security - and to the weekend for some unlucky netadminsPatches15 Jan 2026|2
914 - Search - Chinese spies used Maduro’s capture as a lure to phish US govt agenciesWhat’s next for Venezuela? Click on the file and seeCyber-crime15 Jan 2026|20
915 - Search - Flipping one bit leaves AMD CPUs open to VM vulnFix landed in July, but OEM firmware updates are requiredSecurity15 Jan 2026|23
916 - Search - Contagious Claude Code bug Anthropic ignored promptly spreads to CoworkOffice workers without AI experience warned to watch for prompt injection attacks - good luck with thatSecurity15 Jan 2026|9
917 - Search - A simple CodeBuild flaw put every AWS environment at risk – and pwned ’the central nervous system of the cloud’And it’s ’not unique to AWS,’ researcher tellsThe RegResearch15 Jan 2026|12
918 - Search - US regulator tells GM to hit the brakes on customer trackingSmart Driver pitched as safety app, but feds claim it’s a data-harvesting scheme that jacked up premiumsSecurity15 Jan 2026|38
919 - Search - Woman bailed as cops probe doctor’s surgery data breachSuspect assisting West Midlands Police over alleged theft at Walsall GP practiceSecurity15 Jan 2026|24
920 - Search - Microsoft taps UK courts to dismantle cybercrime host RedVDSRedmond says cheap virtual desktops powered a global wave of phishing and fraudCyber-crime15 Jan 2026|4
921 - Search - Ofcom keeps X under the microscope despite Grok ’nudify’ fixCold milk poured over ‘spicy mode,’ but it might not be enough to escape a huge fineAI + ML15 Jan 2026|21
922 - Search - AWS flips switch on Euro cloud as customers fret about digital sovereigntyEU-only ops, German subsidiaries, and a pinky promise your data won’t end up in Uncle Sam’s handsPaaS + IaaS15 Jan 2026|79
923 - Search - How to access the Dark Web using the Tor Browser
924 - Search - How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11
925 - Search - How to use the Windows Registry Editor
926 - Search - How to backup and restore the Windows Registry
927 - Search - How to start Windows in Safe Mode
928 - Search - How to remove a Trojan, Virus, Worm, or other Malware
929 - Search - How to show hidden files in Windows 7
930 - Search - How to see hidden files in Windows
931 - Search - Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback!
932 - Search - Who Decides Who Doesn’t Deserve Privacy?
933 - Search - Processing 630 Million More Pwned Passwords, Courtesy of the FBI
934 - Search - Data breach disclosure 101: How to succeed after you’ve failed
935 - Search - Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages
936 - Search - Here’s how I verify data breaches
937 - Search - When a nation is hacked: Understanding the ginormous Philippines data breach
938 - Search - How I optimised my life to make my job redundant
939 - Search - ACMI and EOS Collaborate To Boost 3D Printing Manufacturing Capabilities
940 - Search - The Complex
Relationships of East Asia
941 - Search - U.S. Navy Dives Deep
Into Data Density
942 - Search - Ukraine’s Digital Transformation, With a Little Help From Its Friends
943 - Search - PACAF Identifies Technologies To Succeed in the Indo-Pacific
944 - Search - DARPA Developing Small Robots To Perform Medical ‘Miracles’
945 - Search - On Point: Q&A With Carson Billingsley
946 - Search - Spectra Defense Technologies Achieves CMMC Level 2 Certification
947 - Search - The Army Sets Its Sights on Ways To Win the Future Fight
948 - Search - Clearing the Pathway for AI Cultivation
949 - Search - U.S. Army Growing Enterprise Platforms
950 - Search - Space Systems Command Looks To Launch Missile Warning Space Vehicles
951 - Search - Next-Gen Lab Uses Advanced AI and Wargaming To Evolve Warfighting Strategies
952 - Search - Defense Industry Welcomes Initial CSRMC Policy
953 - Search - China’s Extreme Surveillance of the Individual and Implications for Its Military Capabilities
954 - Search - Army Corps of Engineers Research Supercharges Operational Planning
955 - Search - Disruptive By Design: Shutting the Door on Attackers: Operationalizing Secure DNS Principles
956 - Search - U.S. Justice Department Offers Cyber Training for Ukraine
957 - Search - Standardizing the BAS/CS of Critical Infrastructure Cybersecurity Alerts
958 - Search - Cybersecurity and Social Media Influencing Pair Perfectly
959 - Search - Risk Aversion Strategy, Incentive Structure Need Fundamental Modifications
960 - Search - Flashpoint Calculates Rise in Cyber Threats Around the World
961 - Search - President’s Commentary: Innovation and Modernization for the Intelligence Community
962 - Search - FY26 NDAA Text Outlines Acquisition Reform
963 - Search - President’s Commentary: Defeating the Tyranny Imposed by Distance
964 - Search - Advancing Geo Simulation Technology for Precision Missions
965 - Search - Bridging the Divide: How Grandinetta Group Is Redefining Military Transition
966 - Search - Data Centricity for Decision Advantage in Space: Unifying Operations in the Ultimate High Ground
967 - Search - From Carrier Pigeons to Sensor Fusion - Speed Matters in Information
968 - Search - Wireless Common Vulnerabilities and Exposures Continue To Escalate
969 - Search - Software Overlay Provides Identity-Based Security Layer to OSI Model
970 - Search - Communications: Enabling Next-Generation Command and Control
971 - Search - Hunt the Cyber Threat— Before It Hunts You
972 - Search - Bringing Overmatch to Battlefield Communications
973 - Search - The Importance of Wireless Airspace Defense in Today’s Enterprise Environment
974 - Search - For Pentagon’s AI programs, It’s Time for Boots on the Ground
975 - Search - President’s Commentary: Two Countdowns to 2027: Cybersecurity and Indo-Pacific Readiness
976 - Search - On Point: Q&A With Richard Forno
977 - Search - Cross-Cloud Collaboration Paves the Way for Data Transparency: OPM’s Groundbreaking Analytics Solution
##
Industrial Cyber
View Articles
978 - Search - NSA publishes zero trust implementation phases to guide target-level maturity aligned with DoD, NIST guidanceThe U.S. National Security Agency (NSA) published last week two Phases of the Zero Trust Implementation Guidelines (ZIGs) to outline the activities needed to achieve the Department of War (DoW)-defined Target-level Zero Trust (ZT) maturity. Leveraging NIST and DoW published…
979 - Search - Truesec flags ‘OpDenmark’ cyber threat as Russian Legion issues large-scale attack warning against DenmarkNew research from Truesec reports that a newly formed Russian hacker alliance, calling itself the Russian Legion, has issued a warning of an imminent large-scale cyberattack against Denmark, codenamed ‘OpDenmark.’ The alliance, led by the hacker group Cardinal and comprising…
980 - Search - Health-ISAC reports 55% surge in cyber incidents in 2025, as attacks rise and escalation looms in 2026Health-ISAC’s 2025 Fourth Quarter Health Sector Heartbeat shows a sharp rise in cyber incidents, pointing to continued escalation into 2026. A total of 4,043 incidents were recorded across all sectors in the first half of 2025, increasing to 4,860 in…
981 - Search - Forescout reports global cyberattacks spread wider in 2025, with more distributed and costly threats emerging in 2026Forescout Technologies released its 2025 Threat Roundup report, examining the global threat landscape and the trends cyber defenders need to watch in 2026. Forescout Research’s Vedere Labs analyzed more than 900 million attacks recorded worldwide between January and December 2025.…
982 - Search - CERT Polska details cyberattacks on Polish manufacturer, energy sites; fails to disrupt power and heat supplyA new report from CERT Polska highlighted that although the attacks on renewable energy farms disrupted communication between these facilities and distribution network operators, they had no impact on current electricity production. Similarly, the attack on the combined heat and…
983 - Search - AI accelerates industrial cyber threats, transforms OT attack landscape to challenge traditional defensesWhen it comes to cyberattacks across industrial environments, the role of AI (artificial intelligence) falls between real escalation and inflated alarm. Most alleged AI-enabled threats are not stand-alone systems running in isolation within OT networks. Rather, the bad guys are leveraging…
984 - Search - Why OT Cybersecurity Struggles to Prove Its ValueOver the years, I’ve had a front-row seat to how close OT cybersecurity has come to addressing some of its hardest problems. Not because of a lack of capable vendors or thoughtful engineers. Quite the opposite. Many of the technical…
985 - Search - Inside S4x26, where hands-on testing, debate, and proof-of-concept demonstrations set new standard for OT securityAs the industrial cybersecurity community prepares for the upcoming S4x26 conference, running from Feb. 23 to Feb. 26,…Jan 25, 20268 min read
986 - Search - Aligning OT cybersecurity with uptime, safety, and throughput as digital transformation reshapes industrial riskIndustrial cybersecurity is standing at a crossroads where ‘locking down the perimeter’ is no longer enough to protect…Jan 18, 202616 min read
987 - Search - Industrial cyber governance hits inflection point, shifts toward measurable resilience and executive accountabilityIndustrial cyber governance is at a tipping point as legacy models have largely been unable to keep pace…Jan 11, 202612 min read
988 - Search - 2026 and beyond: Urgent need for integrated cybersecurity strategies in evolving industrial landscapeIndustrial cybersecurity is entering a more exposed and strategic phase defined by hard lessons from 2025. Organizations spent…Dec 14, 202515 min read
989 - Search - Increasing attacks on field-level ICS devices highlight need for deeper visibility and granular OT security controlsIndustrial control systems, and in particular those at the lowest organizational levels where sensors, actuators, and PLCs direct real-world…Dec 07, 202511 min read
990 - Search - OT cybersecurity culture gap widens as organizations struggle to keep pace with emerging threatsBridging the OT cybersecurity culture gap remains critical, as only 14% of organizations report feeling fully prepared for…Nov 30, 202515 min read
991 - Search - Rising cost of trust as insider behavior becomes a weak link in critical infrastructure cyber defenseMalicious and negligent insider activity continues to drive a significant portion of cyber risk within OT (operational technology) environments….Nov 23, 202515 min read
992 - Search - A Turning Point for Cyber Physical ResilienceIndustrial Cyber Days: Critical Infrastructure 2025 brought together one of the most diverse gatherings of OT defenders, engineers,…Nov 16, 202511 min read
993 - Search - Industrial cybersecurity faces its reckoning as compliance gives way to accountability and resilienceIndustrial cybersecurity has long lived in the shadow of compliance tied to check boxes, audits, and defensive cost…Nov 09, 202518 min read
994 - Search - ABB launches Automation Extended program to modernize DCS without disrupting operations
995 - Search - Tredence and Snowflake target IT, OT, and IoT convergence for smarter energy operations
996 - Search - Indurex launches to secure critical infrastructure at intersection of AI, CPS security, as cyber-physical risks converge
997 - Search - Beyond Horizontal Standards: Why We Must Converge ISA 99 and ISA 84 to Protect Cyber-Physical Systems
998 - Search - UK Cyber Growth Action Plan set to invest £16 million to boost the cyber sector, secure critical services
999 - Search - The EU’s Cybersecurity Blueprint and the Future of Cyber Crisis Management
1000 - Search - CISA publishes initial list of hardware and software categories supporting post-quantum cryptography to guide adoption
1001 - Search - NIST issues draft Transit Community Profile to support cybersecurity programs across transit agencies
##
Cybersecurity News
View Articles
1002 - Search - Cyber Security NewsLatest Cyber Security News
1003 - Search - GlassWorm Infiltrated VSX Extensions with More than 22,000 Downloads to Attack Developers
1004 - Search - Infostealer Campaigns Expand to macOS as Attackers Abuse Python and Trusted Platforms
1005 - Search - Beware of Fake Dropbox Phishing Attack that Harvest Login Credentials
1006 - Search - Hackers Exploiting React Native’s Metro Server in the Wild to Attack Developers
1007 - Search - Foxit PDF Editor Vulnerabilities Let Attackers Execute Arbitrary JavaScript
1008 - Search - Stronger Incident Prevention Takes Just One CISO Decision
1009 - Search - Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
1010 - Search - PDFly Variant Uses Custom PyInstaller Modification, Forcing Analysts to Reverse-Engineer Decryption
1011 - Search - Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication
1012 - Search - Mozilla Unveils Kill Switch to Disable All Firefox AI features
1013 - Search - Cal.com Broken Access Controls Exposes Millions of Bookings and…
1014 - Search - Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For…
1015 - Search - Beware of Malicious Party Invitations that Tricks Users into…
1016 - Search - Chinese National Jailed to 46 Months for Laundering Millions…
1017 - Search - SoundCloud Data Breach Exposes 29.8 Million Personal users Details
1018 - Search - Top 10 Privileged Users Monitoring Best Practices – 2026
1019 - Search - Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate…
1020 - Search - CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation…
1021 - Search - 10 Best ZTNA Solutions (Zero Trust Network Access) In 2026
1022 - Search - Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild
1023 - Search - Top 10 High-Risk Vulnerabilities Of 2026 that Exploited in the Wild
1024 - Search - Essential E-Signature Solutions for Cybersecurity in 2026
1025 - Search - Top 10 Best Data Removal Services In 2026
1026 - Search - Best VPN Services of 2026: Fast, Secure & Affordable
1027 - Search - Top 10 Best Data Security Companies in 2026
1028 - Search - Top 15 Best Ethical Hacking Tools – 2026
1029 - Search - 12 Best Remote Administration Tools (RAT Tools) – 2026
1030 - Search - AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems
1031 - Search - Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry…
1032 - Search - Argus – Python-powered Toolkit for Information Gathering and Reconnaissance
1033 - Search - Windows Event Log Analysis – Complete Incident Response Guide
1034 - Search - Red Team vs Blue Team Operations : How Does it Works?
1035 - Search - AuraAudit – Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis
##
Varonis Blog
View Articles
1036 - Search - Read all the latest research
1037 - Search - Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA
1038 - Search - Burning Data with Malicious Firewall Rules in Azure SQL Server
1039 - Search - Mind Games: How Social Engineering Tactics Have Evolved
1040 - Search - Varonis ProductsVaronis to Acquire AllTrue.ai to Manage and Secure AI Across the EnterpriseYaki Faitelson3 min readWith the acquisition of AllTrue.ai, Varonis strengthens its ability to help organizations adopt safe, compliant, and trustworthy AI at scale.Yaki Faitelson3 min read
1041 - Search - Data SecurityData Discovery Is Not Data SecurityManav Mital5 min read
1042 - Search - Threat ResearchExfil Out&Look for Logs: Weaponizing Outlook Add-ins for Zero-Trace Email ExfiltrationHadas Shalev3 min read
1043 - Search - Stanley — A $6,000 Russian Malware Toolkit with Chrome Web Store Guarantee
1044 - Search - Varonis Concierge: Extending Data Security Beyond Software
1045 - Search - Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data
1046 - Search - Data SecurityVaronis ProductsJan 23, 2026Varonis SaaS: Fast & Easy Agentless Cloud DeploymentVaronis’ cloud-native Data Security Platform deploys in minutes and delivers immediate protection at scale.Pranit Mallela4 min read
1047 - Search - Data SecurityEmail SecurityRansomwareThreat ResearchJan 09, 2026Cybercrime Predictions for 2026: What We’re Seeing from the FrontlinesDiscover how AI-powered cyber threats, malicious LLMs, and advanced phishing are reshaping security and demanding smarter, data-centric defenses in 2026.Lexi Croisdale4 min read
1048 - Search - Threat ResearchDec 28, 2026MongoBleed (CVE-2025-14847): Risk, Detection & How Varonis Protects YouMongoBleed (CVE‑2025‑14847) is a critical unauthenticated memory-leak vulnerability in MongoDB Server that allows attackers to remotely extract uninitialized heap memory—including sensitive info like credentials.Chen Levy Ben Aroy2 min read
1049 - Search - Email SecurityDec 16, 2025Phishing Attacks: Types, Statistics, and PreventionDiscover the latest phishing attack types, key statistics, and proven prevention strategies to protect organizations across email, messaging apps, and collaboration platforms.Jonathan Villa6 min read
1050 - Search - Data SecurityThreat ResearchDec 09, 2025Spiderman Phishing Kit Mimics Top European Banks With A Few ClicksSee how Spiderman, a new phishing kit targeting customers of European banks, works. The kit features real-time credential theft, OTP capture, and advanced filtering.Daniel Kelley3 min read
1051 - Search - Threat ResearchDec 08, 2025When Passwords Win: A Deep Dive into ROPC-Enabled MFA BypassesSee how attackers use the ROPC OAuth flow to bypass MFA and turn stolen passwords into persistent access, and how you can detect and stop it.Ben Zion Lavi5 min read
##
Pentest Partners Blog
View Articles
1052 - Search - Social EngineeringCovert recording is easy, which is the problem5 Min ReadFeb 03, 2026
1053 - Search - OpinionsMovie breakdown: Hackers (1995)6 Min ReadJan 30, 2026
1054 - Search - Cyber RegulationPreparing for the EU Cyber Resilience Act (CRA)8 Min ReadJan 22, 2026
1055 - Search - PasswordsVulnerabilities and DisclosuresCarlsberg… probably not the best cybersecurity in the world7 Min ReadJan 16, 2026
1056 - Search - Cloud SecurityCompromising a multi-cloud environment from a single exposed secret6 Min ReadJan 13, 2026
1057 - Search - Artificial IntelligenceVulnerabilities and DisclosuresAI noise and the effect it’s having on vulnerability disclosure programs4 Min ReadJan 09, 2026
1058 - Search - Digital Forensics and Incident Response2025, the year of the Infostealer12 Min ReadJan 06, 2026
1059 - Search - Cloud SecurityBeyond cloud compliance dashboards, what’s next?6 Min ReadJan 05, 2026
1060 - Search - Artificial IntelligenceVulnerabilities and DisclosuresEurostar AI vulnerability: when a chatbot goes off the rails18 Min ReadDec 22, 2025
1061 - Search - Digital Forensics and Incident ResponseHow TosThe built-in Windows security features you should be using6 Min ReadDec 04, 2025
1062 - Search - AndroidAndroid Activities 1019 Min ReadNov 27, 2025
1063 - Search - Cloud SecurityHow TosCommon Kubernetes misconfigurations and how to avoid them6 Min ReadNov 18, 2025
1064 - Search - Internet Of ThingsExploiting AgTech connectivity to corner the grain market6 Min ReadNov 13, 2025
1065 - Search - Digital Forensics and Incident ResponseFinding your path into DFIR9 Min ReadNov 11, 2025
1066 - Search - Cyber RegulationWhat testers need to know about the changes to the CHECK scheme4 Min ReadNov 04, 2025
1067 - Search - Consumer AdviceHow TosSecurity awareness: four pillars for staying safe online12 Min ReadOct 30, 2025
1068 - Search - How TosHardening your home lab16 Min ReadOct 23, 2025
1069 - Search - Consumer AdviceHow TosStop payroll diversion scams before they start6 Min ReadOct 21, 2025
1070 - Search - Digital Forensics and Incident ResponseThe logs you’ll wish you had configured if (when) you are breached…7 Min ReadOct 17, 2025
1071 - Search - How TosCompiling static Nmap binary for jobs in restricted environments8 Min ReadOct 14, 2025
1072 - Search - Security BlogWhat Speed 2 gets right and wrong about ship hacking8 Min ReadOct 08, 2025
1073 - Search - Digital Forensics and Incident ResponseHoneypotsSpot trouble early with honeypots and Suricata12 Min ReadOct 02, 2025
1074 - Search - Digital Forensics and Incident ResponseDiscord as a C2 and the cached evidence left behind11 Min ReadSep 16, 2025
1075 - Search - Cyber RegulationSecurity BlogA buyer’s guide to CHECK in 20255 Min ReadSep 10, 2025
1076 - Search - Hardware HackingHow TosStart hacking Bluetooth Low Energy today! (part 3)11 Min ReadSep 04, 2025
1077 - Search - AndroidHow TosAndroid Broadcast Receivers 1016 Min ReadSep 02, 2025
1078 - Search - Hardware HackingHow TosStart hacking Bluetooth Low Energy today! (part 2)9 Min ReadAug 27, 2025
1079 - Search - Hardware HackingHow TosStart hacking Bluetooth Low Energy today! (part 1)15 Min ReadAug 21, 2025
1080 - Search - Cloud SecurityTerraform Cloud token abuse turns speculative plan into remote code execution12 Min ReadAug 15, 2025
1081 - Search - Digital Forensics and Incident ResponseThumbnail forensics. DFIR techniques for analysing Windows Thumbcache7 Min ReadAug 08, 2025
1082 - Search - Cloud SecurityHow TosHow to transfer files in AWS using SSM4 Min ReadAug 05, 2025
1083 - Search - Digital Forensics and Incident ResponseDFIR tools and techniques for tracing user footprints through Shellbags9 Min ReadJul 31, 2025
1084 - Search - Cyber Liability InsuranceRethinking cyber insurance questions to find real risk5 Min ReadJul 30, 2025
1085 - Search - Shameless Self PromotionOur capabilities. A story about what we can achieve11 Min ReadJul 28, 2025
1086 - Search - AndroidHow TosAndroid Services 1019 Min ReadJul 25, 2025
1087 - Search - Internet Of ThingsLeaked data. Continuous glucose monitoring5 Min ReadJul 22, 2025
1088 - Search - Artificial IntelligenceDigital Forensics and Incident ResponseUsing AI Chatbots to examine leaked data4 Min ReadJul 18, 2025
1089 - Search - Vulnerabilities and DisclosuresFramework 13. Press here to pwn5 Min ReadJul 16, 2025
1090 - Search - Digital Forensics and Incident ResponseSil3ncer Deployed – RCE, Porn Diversion, and Ransomware on an SFTP-only Server7 Min ReadJul 11, 2025
1091 - Search - How TosHow to conduct a Password Audit in Active Directory (AD)11 Min ReadJul 08, 2025
1092 - Search - Consumer AdvicePet microchip scams and data leaks in the UK6 Min ReadJul 04, 2025
1093 - Search - Automotive SecurityHow we turned a real car into a Mario Kart controller by intercepting CAN data9 Min ReadJun 26, 2025
1094 - Search - How TosCSP directives. Base-ic misconfigurations with big consequences9 Min ReadJun 23, 2025
1095 - Search - Cyber RegulationHow TosPrepare for the UK Cyber Security and Resilience Bill4 Min ReadJun 19, 2025
1096 - Search - AndroidArtificial IntelligenceAndroid AI UX is great until it leaks your data8 Min ReadJun 17, 2025
1097 - Search - Shameless Self PromotionPTP Cyber Fest 2025. More than just another conference4 Min ReadJun 13, 2025
1098 - Search - Vulnerabilities and DisclosuresFire detection system been pwned? You’re not going to sea10 Min ReadMay 30, 2025
1099 - Search - How TosHow to load unsigned or fake-signed apps on iOS10 Min ReadMay 28, 2025
1100 - Search - Digital Forensics and Incident ResponseShameless Self PromotionWar stories from the DFIR front line11 Min ReadMay 27, 2025
1101 - Search - OT, ICS, IIoT, SCADAFully segregated networks? Your dual-homed devices might disagree9 Min ReadMay 22, 2025
1102 - Search - Artificial IntelligenceRed TeamingBypass SharePoint Restricted View to exfiltrate data using Copilot AI and more…17 Min ReadMay 20, 2025
1103 - Search - How TosVNC. RDP for all to see5 Min ReadMay 16, 2025
1104 - Search - Cyber RegulationSustainabilityNew cybersecurity rules for smart heat pump manufacturers5 Min ReadMay 13, 2025
1105 - Search - Hardware HackingVulnerabilities and DisclosuresRCEs and more in the KUNBUS GmbH Revolution Pi PLC15 Min ReadMay 08, 2025
1106 - Search - Artificial IntelligenceRed TeamingExploiting Copilot AI for SharePoint10 Min ReadMay 07, 2025
1107 - Search - Digital Forensics and Incident ResponseThe remote desktop puzzle. DFIR techniques for dealing with RDP Bitmap Cache8 Min ReadMay 01, 2025
1108 - Search - PasswordsHiding behind a password5 Min ReadApr 29, 2025
1109 - Search - Consumer AdviceThe dangers of web based messaging apps6 Min ReadApr 25, 2025
1110 - Search - Digital Forensics and Incident ResponseUnallocated space analysis5 Min ReadApr 23, 2025
1111 - Search - Digital Forensics and Incident ResponseNot everything in a data leak is real3 Min ReadApr 15, 2025
1112 - Search - How TosDon’t use corporate email for your personal life5 Min ReadApr 09, 2025
1113 - Search - Cyber RegulationInternet Of ThingsPreparing for the EU Radio Equipment Directive security requirements3 Min ReadApr 03, 2025
1114 - Search - How TosBackdoor in the Backplane. Doing IPMI security better7 Min ReadMar 31, 2025
1115 - Search - Digital Forensics and Incident ResponseThe first 24 hours of a cyber incident. A practical playbook6 Min ReadMar 24, 2025
1116 - Search - OpinionsCybersecurity communities. Small hacker groups, big impact5 Min ReadMar 19, 2025
1117 - Search - How TosTake control of Cache-Control and local caching4 Min ReadMar 12, 2025
1118 - Search - GRC Consultancy AdviceHow I became a Cyber Essentials Plus assessor10 Min ReadMar 06, 2025
1119 - Search - How TosDNSSEC NSEC. The accidental treasure map to your subdomains9 Min ReadMar 04, 2025
1120 - Search - Hardware HackingA dive into the Rockchip Bootloader8 Min ReadFeb 26, 2025
1121 - Search - Aviation Cyber SecurityPen testing avionics under ED-203a3 Min ReadFeb 21, 2025
1122 - Search - How TosWatch where you point that cred! Part 18 Min ReadFeb 18, 2025
1123 - Search - Cyber RegulationMaritime Cyber SecurityNew mandatory USCG cyber regulations. What you need to know4 Min ReadFeb 14, 2025
1124 - Search - GRC Consultancy AdvicePCI DSS v4.0 Evidence and documentation requirements checklist6 Min ReadFeb 13, 2025
1125 - Search - GRC Consultancy AdvicePCI DSS. Where to start?4 Min ReadFeb 11, 2025
1126 - Search - OT, ICS, IIoT, SCADAICS testing best results. Hint: Blend your approach6 Min ReadFeb 07, 2025
1127 - Search - How TosA tale of enumeration, and why pen testing can’t be automated7 Min ReadFeb 05, 2025
1128 - Search - Digital Forensics and Incident ResponseHow Garmin watches reveal your personal data, and what you can do8 Min ReadJan 28, 2025
1129 - Search - Maritime Cyber SecurityCyber security guidance for small fleet operators10 Min ReadJan 24, 2025
1130 - Search - Hardware HackingHow to secure body-worn cameras and protect footage from cyber threats4 Min ReadJan 21, 2025
1131 - Search - Consumer AdviceSecurity flaws found in tiny phones promoted to children9 Min ReadJan 15, 2025
1132 - Search - Artificial IntelligenceDigital Forensics and Incident ResponseTackling AI threats. Advanced DFIR methods and tools for deepfake detection14 Min ReadJan 13, 2025
1133 - Search - Aviation Cyber SecurityThe unexpected effects of GPS spoofing on aviation safety8 Min ReadJan 09, 2025
1134 - Search - Digital Forensics and Incident Response10 Non-tech things you wish you had done after being breached5 Min ReadJan 07, 2025
1135 - Search - Aviation Cyber SecurityThe surprising existence of the erase button on cockpit voice recorders8 Min ReadJan 03, 2025
1136 - Search - Internet Of ThingsHeels on fire. Hacking smart ski socks3 Min ReadDec 23, 2024
1137 - Search - Digital Forensics and Incident ResponsePractice being punched in the face. The realities of incident response preparation4 Min ReadDec 20, 2024
1138 - Search - Hardware HackingHow easily access cards can be cloned and why your PACS might be vulnerable12 Min ReadDec 11, 2024
1139 - Search - Hardware HackingMaking sure your door access control system is secure: Top 5 things to check3 Min ReadDec 09, 2024
1140 - Search - Hardware HackingIs secure boot on the main application processor enough?5 Min ReadDec 05, 2024
1141 - Search - Digital Forensics and Incident Response6 non tech things you wish you had done before being breached5 Min ReadDec 03, 2024
1142 - Search - Digital Forensics and Incident ResponseBEC-ware the Phish (part 3): Detect and Prevent Incidents in M3658 Min ReadNov 27, 2024
1143 - Search - Consumer AdviceHow we helped expose a £12 million rental scam8 Min ReadNov 19, 2024
1144 - Search - Cyber RegulationMaritime Cyber SecurityIACS UR E26 and E27 guidance30 Min ReadNov 14, 2024
1145 - Search - Maritime Cyber SecurityDid security gaps at Antwerp port enable drug smuggling operations?5 Min ReadNov 12, 2024
1146 - Search - Digital Forensics and Incident ResponseBEC-ware the Phish (part 2): Respond and Remediate Incidents in M36514 Min ReadNov 08, 2024
1147 - Search - Consumer AdviceDigital Forensics and Incident ResponseYou lost your iPhone, but it’s locked. That’s fine, right?5 Min ReadNov 06, 2024
1148 - Search - Maritime Cyber SecurityWhat goes into testing a ship?8 Min ReadNov 05, 2024
1149 - Search - Maritime Cyber SecurityMaritime lawyers assemble!6 Min ReadNov 05, 2024
1150 - Search - Digital Forensics and Incident ResponseMounting memory with MemProcFS for advanced memory forensics10 Min ReadOct 31, 2024
1151 - Search - OpinionsTesting the security of CCTV systems4 Min ReadOct 30, 2024
##
The Register
##
Security Affairs
View Articles
1154 - Search - U.S. CISA adds SolarWinds Web Help Desk, Sangoma FreePBX, and GitLab flaws to its Known Exploited Vulnerabilities catalog
1155 - Search - Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
1156 - Search - APT28 exploits Microsoft Office flaw in Operation Neusploit
1157 - Search - Notepad++ infrastructure hack likely tied to China-nexus APT Lotus Blossom
1158 - Search - MoltBot Skills exploited to distribute 400+ malware packages in days
1159 - Search - Panera Bread breach affected 5.1 Million accounts, HIBP Confirms
1160 - Search - Hackers exploit unsecured MongoDB instances to wipe data and demand ransom
1161 - Search - SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82
1162 - Search - Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates
1163 - Search - Security Affairs newsletter Round 561 by Pierluigi Paganini – INTERNATIONAL EDITION
1164 - Search - DOJ releases details alleged talented hacker working for Jeffrey Epstein
1165 - Search - Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
1166 - Search - SmarterTools patches critical SmarterMail flaw allowing code execution
1167 - Search - U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog
1168 - Search - Empire Market co-founder faces 10 years to life after guilty plea
1169 - Search - SolarWinds addressed four critical Web Help Desk flaws
1170 - Search - Google targets IPIDEA in crackdown on global residential proxy networks
1171 - Search - Nation-state and criminal actors leverage WinRAR flaw in attacks
1172 - Search - OpenSSL issued security updates to fix 12 flaws, including Remote Code Execution
1173 - Search - U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
1174 - Search - VoidLink shows how one developer used AI to build a powerful Linux malware
1175 - Search - Crooks impersonate LastPass in campaign to harvest master passwords
1176 - Search - Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid
1177 - Search - Nike is investigating a possible data breach, after WorldLeaks claims
1178 - Search - Fortinet patches actively exploited FortiOS SSO auth bypass (CVE-2026-24858)
##
Security Boulevard
View Articles
1179 - Search - The ‘Invisible Risk’: 1.5 Million Unmonitored AI Agents Threaten Corporate Security
1180 - Search - French Police Raid X Paris Office, Summon Musk Over Grok Deepfakes
1181 - Search - JFrog Researchers Surface Vulnerabilities in AI Automation Platform from n8n
1182 - Search - Fast-Growing Chinese Crime Networks Launder 20% of Illicit Crypto: Chainalysis
1183 - Search - ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data
1184 - Search - Security Is Shifting From Prevention to Resilience
1185 - Search - Using AI Agents to Separate Real Risk From Vulnerability Noise
1186 - Search - The Gaps That Created the New Wave of SIEM and AI SOC Vendors
1187 - Search - Feb 3 | Raffael Marty
1188 - Search - AI Governance in Cybersecurity: Building Trust and Resilience in the Age of Intelligent Security
1189 - Search - Feb 3 | Anamika Pandey
1190 - Search - Feb 2 | Jeffrey Burt
1191 - Search - F5 Strengthens, Scales & Sustains AI Security With Integrated Runtime Protection
1192 - Search - Jan 26 | Adrian Bridgwater
1193 - Search - [Webinar] Doing More With Less: How Security Teams Escape Manual Work with Efficient Workflows
1194 - Search - Jan 24 | Alexandra Charikova
1195 - Search - DAST vs Penetration Testing: Key Differences in 2026
1196 - Search - Powerful antivirus guidance for Mac‑first organizations in 2026
1197 - Search - Jan 27 | Shweta Dhole
1198 - Search - Top 10 CISOs’ strategic priorities in 2026
1199 - Search - Jan 21 | Sravish Sridhar
1200 - Search - What a Year of DORA Reveals About Cyber Resilience
1201 - Search - Jan 20 | Aaron Linskens
1202 - Search - Why is scalability critical in secrets management
1203 - Search - Feb 2 | Alison Mack
1204 - Search - How to ensure empowered data handling with Agentic AI
1205 - Search - The Ultimate Guide to Single Sign-On in 2025
1206 - Search - Feb 3 | SSOJet - Enterprise SSO & Identity Solutions
1207 - Search - Is the Online Account Service Still Available?
1208 - Search - What is SAML and how does SAML Authentication Work?
1209 - Search - Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks
1210 - Search - From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience
1211 - Search - Jan 23 | Brad LaPorte
1212 - Search - AI Threat Detection: Why it’s Essential for Effective Incident Response
1213 - Search - Jan 20 | Kevin Mata
1214 - Search - Is Facial Recognition Considered a Passkey?
1215 - Search - Dec 28 | MojoAuth - Advanced Authentication & Identity Solutions
1216 - Search - Understanding the Difference Between Passkeys and Biometrics
1217 - Search - Are Your Mobile APIs The New Weak Link? What Zscaler Just Exposed
1218 - Search - Dec 2 | George McGregor
1219 - Search - More IoT & ICS Security
1220 - Search - Feb 3 | Michael Vizard
1221 - Search - BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game
1222 - Search - Feb 2 | Teri Robinson
1223 - Search - Flaw in Broadcom Wi-Fi Chipsets Illuminates Importance of Wireless Dependability and Business Continuity
1224 - Search - Use of XMRig Cryptominer by Threat Actors Expanding: Expel
1225 - Search - Malware Campaign Abuses Booking.com Against Hospitality Sector
1226 - Search - Google Chrome Extension is Intercepting Millions of Users’ AI Chats
1227 - Search - Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million
1228 - Search - China Hackers Using Brickstorm Backdoor to Target Government, IT Entities
1229 - Search - Reorient Your Thinking to Tackle AI Security Risks
1230 - Search - Feb 2 | John Verry
1231 - Search - Zero-Trust Isn’t Optional Anymore—It’s Your AI Agent Fire Drill
1232 - Search - Jan 12 | Alan Shimel
1233 - Search - AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments
1234 - Search - Dec 9 | Marian Newsome
1235 - Search - Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul
1236 - Search - Dec 9 | Jack Poller
1237 - Search - Autonomous IT: Transforming Operations and Security in Real Time with AI
1238 - Search - From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
1239 - Search - All Aboard the Zero-Trust Train
1240 - Search - We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
1241 - Search - Can a Transparent Piece of Plastic Win the Invisible War on Your Identity?
1242 - Search - Gartner’s AI Browser Ban: Rearranging Deck Chairs on the Titanic
1243 - Search - The Death of Legacy MFA and What Must Rise in Its Place
1244 - Search - GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats
1245 - Search - C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements
1246 - Search - Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption
1247 - Search - RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients
1248 - Search - ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On
1249 - Search - Security Creators Network - Latest
1250 - Search - Adversarial Exposure Validation for Modern Environments
1251 - Search - StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces
1252 - Search - Top 6 Data Breaches of January 2026
1253 - Search - 10 Best B2B Fintech SSO Solutions in 2026
1254 - Search - The Great Shift: Cybersecurity Predictions for 2026 and the New Era of Threat Intelligence
1255 - Search - How is Agentic AI changing healthcare security
1256 - Search - Blockchain Penetration Testing: Definition, Process, and Tools
1257 - Search - MIND Extends DLP Reach to AI Agents
1258 - Search - Add your blog to Security Creators Network
1259 - Search - MY TAKE: Transparent vs. opaque — edit Claude’s personalized memory, or trust ChatGPT’s blindly?
1260 - Search - STRATEGIC REEL: Certificate expiration is speeding up — outpacing legacy management
1261 - Search - Critical CERT-In Advisories – January 2026: SAP, Microsoft, and Atlassian Vulnerabilities
1262 - Search - AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices
1263 - Search - News Alert: Halo Security earns SOC 2 Type II certification, shows sustained operational security
1264 - Search - News alert: Reflectiz study finds most third-party web apps access sensitive data without justification
1265 - Search - SHARED INTEL Q&A: AI retrieval systems can still hallucinate; deterministic logic offers a fix
1266 - Search - News alert: Forrester study finds Airlock Digital’s app control cuts breaches to zero with 224% ROI
1267 - Search - News alert: One Identity launches AI-powered ‘Identity Manager’ to speed threat response
##
The Hacker News
View Articles
1268 - Search - Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image MetadataFeb 03, 2026Artificial Intelligence / VulnerabilityCybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon , an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by Docker with the release of version 4.50.0 in November 2025. “In DockerDash, a single malicious metadata label in a Docker image can be used to compromise your Docker environment through a simple three-stage attack: Gordon AI reads and interprets the malicious instruction, forwards it to the MCP [Model Context Protocol] Gateway, which then executes it through MCP tools,” Sasi Levi, security research lead at Noma, said in a report shared with The Hacker News. “Every stage happens with zero validation, taking advantage of current agents and MCP Gateway architecture.” …
1269 - Search - [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and AutomateFeb 03, 2026Threat Detection / Enterprise SecurityMost security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This live session, " Breaking Down the Modern SOC: What to Build vs Buy vs Automate ," with Kumar Saurabh (CEO, AirMDR) and Francis Odum (CEO, SACR) , clears the fog. No jargon. Just real answers to the question every security leader faces: What should we build, what should we buy, and what should we automate? Secure your spot for the live session ➜ You’ll see what a healthy modern SOC looks like today—how top-performing teams decide where to build, when to buy, and how to automate without losing control. The session goes beyond theory: expect a real customer case study, a si…
1270 - Search - Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm PackageFeb 03, 2026Open Source / VulnerabilityThreat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands on the underlying host. Details of the flaw were first documented by JFrog in November 2025. Despite more than a month after initial exploitation in the wild, the “activity has yet to see broad public acknowledgment,” it added. In the attack detected against its honeypot network, the threat actors have weaponized the flaw to deliver a Base64-encoded PowerShell script that, once parsed, is configured to perform a series of actions, including Microsoft Defender Antivirus exclusions for the current working directory and the temporary folder (…
1271 - Search - When Cloud Outages Ripple Across the InternetFeb 03, 2026Cloud Computing / Zero TrustRecent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For consumers, these outages are often experienced as an inconvenience, such as being unable to order food, stream content, or access online services. For businesses, however, the impact is far more severe. When an airline’s booking system goes offline, lost availability translates directly into lost revenue, reputational damage, and operational disruption. These incidents highlight that cloud outages affect far more than compute or networking. One of the most critical and impactful areas is identity. When authentication and authorization are disrupted, the result is not just downtime; it is a core operational and security inci…
1272 - Search - APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware AttacksFeb 03, 2026Vulnerability / MalwareThe Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit . Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three days after Microsoft publicly disclosed the existence of the bug. The vulnerability in question is CVE-2026-21509 (CVSS score: 7.8), a security feature bypass in Microsoft Office that could allow an unauthorized attacker to send a specially crafted Office file and trigger it. The Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), and Office Product Group Security Team, along with Google Threat Intelligence Group (GTIG), have been credited with discovering and reporting the flaw. “Social engineering lures were crafted in both English and localized …
1273 - Search - Mozilla Adds One-Click Option to Disable Generative AI Features in FirefoxFeb 03, 2026Artificial Intelligence / PrivacyMozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. “It provides a single place to block current and future generative AI features in Firefox,” Ajit Varma, head of Firefox, said . “You can also review and manage individual AI features if you choose to use them. This lets you use Firefox without AI while we continue to build AI features for those who want them.” Mozilla first announced its plans to integrate AI into Firefox in November 2025, stating it’s fully opt-in and that it’s incorporating the technology while placing users in the driver’s seat. The new feature is expected to be rolled out with Firefox 148, which is scheduled to be released on February 24, 2026. At the outset, AI controls will allow users to manage the following settings individually - Translations Alt text in PDFs (adding accessibility descrip…
1274 - Search - Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking GroupFeb 03, 2026Malware / Open SourceA China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7. The development comes shortly after Notepad++ maintainer Don Ho said that a compromise at the hosting provider level allowed threat actors to hijack update traffic starting June 2025 and selectively redirect such requests from certain users to malicious servers to serve a tampered update by exploiting insufficient update verification controls that existed in older versions of the utility. The weakness was plugged in December 2025 with the release of version 8.8.9. It has since emerged that the hosting provider for the software was breached to perform targeted traffic redirections until December 2, 2025, when the attac…
1275 - Search - Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw UsersFeb 02, 2026Malware / Artificial IntelligenceA security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It’s an extension to the OpenClaw project, a self-hosted artificial intelligence (AI) assistant formerly known as both Clawdbot and Moltbot. The analysis, which Koi conducted with the help of an OpenClaw bot named Alex, found that 335 skills use fake pre-requisites to install an Apple macOS stealer named Atomic Stealer (AMOS). This activity set has been codenamed ClawHavoc . “You install what looks like a legitimate skill – maybe solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov said. “The skill’s documentation looks professional. But there’s a ‘Prerequisites’ section that says you need to install something first.” This…
1276 - Search - OpenClaw Bug Enables One-Click Remote Code Execution via Malicious LinkFeb 02, 2026Vulnerability / Artificial IntelligenceA high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a token exfiltration vulnerability that leads to full gateway compromise. “The Control UI trusts gatewayUrl from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload,” OpenClaw’s creator and maintainer Peter Steinberger said in an advisory. “Clicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim’s local gateway, modify config (sandbox, tool policies), and invoke privileged actions, achieving 1-click RCE."
1277 - Search - Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to KerberosFeb 02, 2026Kerberos / Enterprise SecurityMicrosoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad actors to gain unauthorized access to network resources. NTLM was formally deprecated in June 2024 and no longer receives updates. “NTLM consists of security protocols originally designed to provide authentication, integrity, and confidentiality to users,” Mariam Gewida, Technical Program Manager II at Microsoft, explained. “However, as security threats have evolved, so have our standards to meet modern security expectations. Today, NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography.” Despite the d…
1278 - Search - ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New ThreatsFeb 02, 2026Hacking News / CybersecurityEvery week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to stay ahead. This week’s recap brings you the key moments that matter most, in one place, so you can stay informed and ready for what’s next. ⚡ Threat of the Week Google Disrupts IPIDEA Residential Proxy Network — Google has crippled IPIDEA, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains. According to the tech giant, not only do these networks permit bad actors to conceal their malicious traffic, but they also open up users who enroll their devices to further attacks. Residential IP addresses in the U.S., Canada, and Europe were seen as the most desirable. …
1279 - Search - Securing the Mid-Market Across the Complete Threat LifecycleFeb 02, 2026Threat Detection / Endpoint SecurityFor mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can’t absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response. While necessary, this places a significant operational burden on teams already stretched thin. A more sustainable approach is security across the complete threat lifecycle—combining prevention, protection, detection, and response in a way that reduces risk without increasing cost or complexity. Why Mid-Market Security Often Feels Stuck Most mid-market organizations rely on a small set of foundational tools, such as endpoint protection, email security, and network firewalls….
1280 - Search - Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
1281 - Search - Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
1282 - Search - ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
1283 - Search - WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
1284 - Search - Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
1285 - Search - Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
1286 - Search - Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
1287 - Search - Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
1288 - Search - Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
1289 - Search - ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs and 25+ More Stories
1290 - Search - Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
1291 - Search - Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
1292 - Search - SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
1293 - Search - Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
1294 - Search - CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
1295 - Search - Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
1296 - Search - When Your Browser Becomes The Attacker: AI Browser ExploitsFebruary 2, 2026Read ➝
1297 - Search - How to Secure Your Mid-Market Business Across the Complete Threat LifecycleFebruary 2, 2026Read ➝
1298 - Search - CTM360 Research Reveals 30,000+ Fake Online Shops Impersonating Fashion BrandsFebruary 2, 2026Read ➝
1299 - Search - OT Security, In Practice: 4 Cross‑Industry Trends from Global Assessments and How CISOs Should RespondFebruary 2, 2026Read ➝
##
ThreatPost
View Articles
1300 - Search - Student Loan Breach Exposes 2.5M Records
1301 - Search - Watering Hole Attacks Push ScanBox Keylogger
1302 - Search - Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
1303 - Search - Ransomware Attacks are on the Rise
1304 - Search - Inside the Hackers’ Toolkit – Podcast
1305 - Search - Being Prepared for Adversarial Attacks – Podcast
1306 - Search - The State of Secrets Sprawl – Podcast
1307 - Search - A Blockchain Primer and a Bored Ape Headscratcher – Podcast
1308 - Search - Security Innovation: Secure Systems Start with Foundational Hardware
1309 - Search - Securely Access Your Machines from Anywhere – Presented by Keeper Security
1310 - Search - Log4j Exploit: Lessons Learned and Risk Reduction Best Practices
1311 - Search - How to ID and Protect Sensitive Cloud Data: The Secret to Keeping Secrets
1312 - Search - Cloud Security: The Forecast for 2022
1313 - Search - 2021: The Evolution of Ransomware
1314 - Search - Healthcare Security Woes Balloon in a Covid-Era World
1315 - Search - 2020 in Security: Four Stories from the New Threat Landscape
1316 - Search - Cybercriminals Are Selling Access to Chinese Surveillance Cameras
1317 - Search - Twitter Whistleblower Complaint: The TL;DR Version
1318 - Search - Firewall Bug Under Active Attack Triggers CISA Warning
1319 - Search - Fake Reservation Links Prey on Weary Travelers
1320 - Search - iPhone Users Urged to Update to Patch 2 Zero-Days
1321 - Search - Is your Java up to date?
1322 - Search - Top 5 Tips to Avoid Viruses and Spyware
1323 - Search - U.S. needs to investigate cyberweapons
1324 - Search - Six months later, DNS still taking a hit
1325 - Search - Pwn2Own 2009: Browsers and smart phones are targets
1326 - Search - Protecting Phones From Pegasus-Like Spyware Attacks
1327 - Search - Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales
1328 - Search - Spotlight on Cybercriminal Supply Chains
1329 - Search - Breaking Down Joe Biden’s $10B Cybersecurity ‘Down Payment’
1330 - Search - CISOs Prep For COVID-19 Exposure Notification in the Workplace
1331 - Search - Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High
1332 - Search - PYSA Emerges as Top Ransomware Actor in November
1333 - Search - Encrypted & Fileless Malware Sees Big Growth
1334 - Search - Innovative Proxy Phantom ATO Fraud Ring Haunts eCommerce Accounts
1335 - Search - Women, Minorities Are Hacked More Than Others
1336 - Search - Cyberattackers Put the Pedal to the Medal: Podcast
1337 - Search - MacOS Malware: Myth vs. Truth – Podcast
1338 - Search - Top 3 Attack Trends in API Security – Podcast
1339 - Search - Reporting Mandates to Clear Up Feds’ Hazy Look into Threat Landscape – Podcast
1340 - Search - Staff Think Conti Group Is a Legit Employer – Podcast
1341 - Search - Lyceum APT Returns, This Time Targeting Tunisian Firms
1342 - Search - National Surveillance Camera Rollout Roils Privacy Activists
1343 - Search - Malware Gangs Partner Up in Double-Punch Security Threat
1344 - Search - How Email Attacks are Evolving in 2021
1345 - Search - Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks
1346 - Search - Ransomware and IP Theft: Top COVID-19 Healthcare Security Scares
1347 - Search - How the Pandemic is Reshaping the Bug-Bounty Landscape
1348 - Search - Experts Weigh in on E-Commerce Security Amid Snowballing Threats
1349 - Search - Cybercriminals Step Up Their Game Ahead of U.S. Elections
1350 - Search - 2020 Cybersecurity Trends to Watch
1351 - Search - Top Mobile Security Stories of 2019
1352 - Search - Facebook Security Debacles: 2019 Year in Review
1353 - Search - Biggest Malware Threats of 2019
1354 - Search - Top 10 IoT Disasters of 2019
1355 - Search - 2019 Malware Trends to Watch
1356 - Search - Top 2018 Security and Privacy Stories
##
CSO Online
View Articles
1359 - Search - blogCSO Security CouncilExpert insights and strategic guidance for CISOs on emerging threats, AI risks, zero trust and enterprise security leadership. This blog is part of the Foundry Expert Contributor Network. Want to join? Learn more here: https://www.csoonline.com/exper...89 articles
##
Troy Hunt
##
Last Watchdog
##
Schneier on Security
View Articles
1362 - Search - Microsoft is Giving the FBI BitLocker Keys
1363 - Search - AI Coding Assistants Secretly Copying All Code to China
1364 - Search - Friday Squid Blogging: New Squid Species Discovered
1365 - Search - AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
1366 - Search - The Constitutionality of Geofence Warrants
1367 - Search - Ireland Proposes Giving Police New Digital Surveillance Powers
1368 - Search - Friday Squid Blogging: Giant Squid in the Star Trek Universe
1369 - Search - AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
1370 - Search - Why AI Keeps Falling for Prompt Injection Attacks
1371 - Search - Internet Voting is Too Insecure for Use in Elections
1372 - Search - Four Ways AI Is Being Used to Strengthen Democracies Worldwide
1373 - Search - The CrowdStrike Outage and Market-Driven Brittleness
1374 - Search - How Online Privacy Is Like Fishing
1375 - Search - How AI Will Change Democracy
1376 - Search - Seeing Like a Data Structure