German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists | Cybersecurity

Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a…

Read more

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery | Cybersecurity

Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at…

Read more

Apple Pay phish uses fake support calls to steal payment details | Malware

It started with an email that looked boringly familiar: Apple logo, a clean layout, and a subject line designed to make the target’s stomach drop. The message claimed Apple has…

Read more

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk | Cybersecurity

Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for…

Read more

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware | Cybersecurity

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to…

Read more

Flock cameras shared license plate data without permission | Malware

Mountain View, California, pulled the plug on its entire license plate reader camera network this week. It discovered that Flock Safety, which ran the system, had been sharing city data…

Read more

Open the wrong “PDF” and attackers gain remote access to your PC | Malware

Cybercriminals behind a campaign dubbed DEAD#VAX are taking phishing one step further by delivering malware inside virtual hard disks that pretend to be ordinary PDF documents. Open the wrong “invoice”…

Read more

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack | Cybersecurity

Ravie LakshmananFeb 05, 2026Botnet / Network Security The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps)…

Read more

The Buyer’s Guide to AI Usage Control | Cybersecurity

Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster…

Read more

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows | Cybersecurity

Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution…

Read more

A fake cloud storage alert that ends at Freecash | Malware

Last week we talked about an app that promises users they can make money testing games, or even just by scrolling through TikTok. Imagine our surprise when we ended up…

Read more

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models | Cybersecurity

Ravie LakshmananFeb 04, 2026Artificial Intelligence / Software Security Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and…

Read more

Firefox is giving users the AI off switch | Malware

Some software providers have decided to lead by example and offer users a choice about the Artificial Intelligence (AI) features built into their products. The latest example is Mozilla, which…

Read more

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns | Cybersecurity

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research…

Read more

Grok continues producing sexualized images after promised fixes | Malware

Journalists decided to test whether the Grok chatbot still generates non‑consensual sexualized images, even after xAI, Elon Musk’s artificial intelligence company, and X, the social media platform formerly known as…

Read more

How Early Decisions Shape Incident Response Investigations | Cybersecurity

Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information…

Read more

Apple’s new iOS setting addresses a hidden layer of location tracking | Malware

Most iPhone owners have hopefully learned to manage app permissions by now, including allowing location access. But there’s another layer of location tracking that operates outside these controls. Your cellular…

Read more

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog | Cybersecurity

Ravie LakshmananFeb 04, 2026Software Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its…

Read more

AT&T breach data resurfaces with new risks for customers | Malware

When data resurfaces, it never comes back weaker. A newly shared dataset tied to AT&T shows just how much more dangerous an “old” breach can become once criminals have enough…

Read more

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata | Cybersecurity

Ravie LakshmananFeb 03, 2026Artificial Intelligence / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and…

Read more

An AI plush toy exposed thousands of private chats with children | Malware

Bondu’s AI plush toy exposed a web console that let anyone with a Gmail account read about 50,000 private chats between children and their cuddly toys. Bondu’s toy is marketed…

Read more

Learn What to Build, Buy, and Automate | Cybersecurity

The Hacker NewsFeb 03, 2026Threat Detection / Enterprise Security Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises…

Read more

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks | Cybersecurity

Ravie LakshmananFeb 03, 2026Vulnerability / Malware The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office…

Read more

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group | Cybersecurity

Ravie LakshmananFeb 03, 2026Malware / Open Source A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting…

Read more

Scam-checking just got easier: Malwarebytes is now in ChatGPT  | Malware

If you’ve ever stared at a suspicious text, email, or link and thought “Is this a scam… or am I overthinking it?” Well, you’re not alone.  Scams are getting harder to spot, and even savvy internet users get…

Read more

How Manifest v3 forced us to rethink Browser Guard, and why that’s a good thing  | Malware

As a Browser Guard user, you might not have noticed much difference lately. Browser Guard still blocks scams and phishing attempts just like always, and, in many cases, even better….

Read more

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users | Cybersecurity

A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks….

Read more

9 Identity Security Predictions for 2026 | Cybersecurity

The world of identity security is in constant motion. What was once a straightforward matter of usernames and passwords has evolved into a complex ecosystem of biometrics, hardware tokens, and…

Read more

How fake party invitations are being used to install remote access tools | Malware

“You’re invited!”  It sounds friendly, familiar and quite harmless. But in a scam we recently spotted, that simple phrase is being used to trick victims into installing a full remote access tool on their Windows computers—giving attackers complete control of the system.  What appears…

Read more

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware | Cybersecurity

The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and…

Read more
Update cookies preferences