German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists | Cybersecurity
Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a…
Read moreChina-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery | Cybersecurity
Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at…
Read moreApple Pay phish uses fake support calls to steal payment details | Malware
It started with an email that looked boringly familiar: Apple logo, a clean layout, and a subject line designed to make the target’s stomach drop. The message claimed Apple has…
Read moreCISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk | Cybersecurity
Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for…
Read moreCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware | Cybersecurity
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to…
Read moreFlock cameras shared license plate data without permission | Malware
Mountain View, California, pulled the plug on its entire license plate reader camera network this week. It discovered that Flock Safety, which ran the system, had been sharing city data…
Read moreOpen the wrong “PDF” and attackers gain remote access to your PC | Malware
Cybercriminals behind a campaign dubbed DEAD#VAX are taking phishing one step further by delivering malware inside virtual hard disks that pretend to be ordinary PDF documents. Open the wrong “invoice”…
Read moreAISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack | Cybersecurity
Ravie LakshmananFeb 05, 2026Botnet / Network Security The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps)…
Read moreThe Buyer’s Guide to AI Usage Control | Cybersecurity
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster…
Read moreCritical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows | Cybersecurity
Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution…
Read moreA fake cloud storage alert that ends at Freecash | Malware
Last week we talked about an app that promises users they can make money testing games, or even just by scrolling through TikTok. Imagine our surprise when we ended up…
Read moreMicrosoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models | Cybersecurity
Ravie LakshmananFeb 04, 2026Artificial Intelligence / Software Security Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and…
Read moreFirefox is giving users the AI off switch | Malware
Some software providers have decided to lead by example and offer users a choice about the Artificial Intelligence (AI) features built into their products. The latest example is Mozilla, which…
Read moreChina-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns | Cybersecurity
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research…
Read moreGrok continues producing sexualized images after promised fixes | Malware
Journalists decided to test whether the Grok chatbot still generates non‑consensual sexualized images, even after xAI, Elon Musk’s artificial intelligence company, and X, the social media platform formerly known as…
Read moreHow Early Decisions Shape Incident Response Investigations | Cybersecurity
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information…
Read moreApple’s new iOS setting addresses a hidden layer of location tracking | Malware
Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer of location tracking that operates outside these controls. Your cellular…
Read moreCISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog | Cybersecurity
Ravie LakshmananFeb 04, 2026Software Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its…
Read moreAT&T breach data resurfaces with new risks for customers | Malware
When data resurfaces, it never comes back weaker. A newly shared dataset tied to AT&T shows just how much more dangerous an “old” breach can become once criminals have enough…
Read moreDocker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata | Cybersecurity
Ravie LakshmananFeb 03, 2026Artificial Intelligence / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and…
Read moreAn AI plush toy exposed thousands of private chats with children | Malware
Bondu’s AI plush toy exposed a web console that let anyone with a Gmail account read about 50,000 private chats between children and their cuddly toys. Bondu’s toy is marketed…
Read moreLearn What to Build, Buy, and Automate | Cybersecurity
The Hacker NewsFeb 03, 2026Threat Detection / Enterprise Security Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises…
Read moreAPT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks | Cybersecurity
Ravie LakshmananFeb 03, 2026Vulnerability / Malware The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office…
Read moreNotepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group | Cybersecurity
Ravie LakshmananFeb 03, 2026Malware / Open Source A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting…
Read moreScam-checking just got easier: Malwarebytes is now in ChatGPT | Malware
If you’ve ever stared at a suspicious text, email, or link and thought “Is this a scam… or am I overthinking it?” Well, you’re not alone. Scams are getting harder to spot, and even savvy internet users get…
Read moreHow Manifest v3 forced us to rethink Browser Guard, and why that’s a good thing | Malware
As a Browser Guard user, you might not have noticed much difference lately. Browser Guard still blocks scams and phishing attempts just like always, and, in many cases, even better….
Read moreResearchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users | Cybersecurity
A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks….
Read more9 Identity Security Predictions for 2026 | Cybersecurity
The world of identity security is in constant motion. What was once a straightforward matter of usernames and passwords has evolved into a complex ecosystem of biometrics, hardware tokens, and…
Read moreHow fake party invitations are being used to install remote access tools | Malware
“You’re invited!” It sounds friendly, familiar and quite harmless. But in a scam we recently spotted, that simple phrase is being used to trick victims into installing a full remote access tool on their Windows computers—giving attackers complete control of the system. What appears…
Read moreeScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware | Cybersecurity
The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and…
Read more