Category: TheHackerNews

Malicious ClawHub Skills
08
Feb
2026

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

OpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan skills that are being uploaded…

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
07
Feb
2026

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information…

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
06
Feb
2026

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework…

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
06
Feb
2026

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian…

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
06
Feb
2026

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

Ravie LakshmananFeb 06, 2026Cyber Espionage / Malware A previously undocumented cyber espionage group operating from Asia broke into the networks…

How Samsung Knox Helps Stop Your Network Security Breach
06
Feb
2026

How Samsung Knox Helps Stop Your Network Security Breach

As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat…

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
06
Feb
2026

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index…

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
06
Feb
2026

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

Ravie LakshmananFeb 06, 2026Artificial Intelligence / Vulnerability Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM),…

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
05
Feb
2026

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

Ravie LakshmananFeb 05, 2026Botnet / Network Security The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a…

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
05
Feb
2026

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage The elusive Iranian threat group known as Infy (aka Prince of Persia) has…

The Buyer’s Guide to AI Usage Control
05
Feb
2026

The Buyer’s Guide to AI Usage Control

Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and…

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
05
Feb
2026

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation…