Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV
Interlock ransomware operators have been observed using a new process‑killing tool that abuses a zero‑day flaw in a gaming anti‑cheat kernel driver to try to…
Interlock ransomware operators have been observed using a new process‑killing tool that abuses a zero‑day flaw in a gaming anti‑cheat kernel driver to try to…
Some software providers have decided to lead by example and offer users a choice about the Artificial Intelligence (AI) features built into their products. The…
Microsoft: Info-Stealing malware expands from Windows to macOS Pierluigi Paganini February 04, 2026 Microsoft warns info-stealing attacks are expanding from Windows to macOS, using cross-platform…
A Taiwanese man was sentenced to 30 years in prison for operating Incognito Market, one of the world’s largest online narcotics marketplaces that sold over…
Teams Chats Image Retrieval Microsoft has resolved an outage affecting inline images in Microsoft Teams chats, restoring normal functionality for millions of enterprise users worldwide.…
A new threat called PhantomVAI, a custom “loader” used to launch cyberattacks worldwide. A loader is a type of malicious software designed to secretly download…
The Hacker NewsFeb 04, 2026Identity Security / Security Operations An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge:…
CISA Warns SolarWinds Web Help Desk Vulnerability An urgent warning regarding a critical remote code execution (RCE) vulnerability in SolarWinds Web Help Desk. The vulnerability,…
A severe vulnerability affecting ASUSTOR Network Attached Storage (NAS) devices has been disclosed, potentially allowing unauthenticated attackers to seize full control of affected systems. Tracked…
Researchers at Tenable have disclosed two vulnerabilities, collectively referred to as “LookOut,” affecting Google Looker. Because the business intelligence platform is deployed by more than…
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when…
Alisa Viejo, United States, February 4th, 2026, CyberNewsWire One Identity, a leader in unified identity security, today announced the appointment of Gihan Munasinghe as Chief Technology…