What the Extortion Gang Didn’t Want You to Know
03
Feb
2026

What the Extortion Gang Didn’t Want You to Know

Inside the Iron Mountain Breach: What the Extortion Gang Didn’t Want You to Know Skip to content We use cookies…

Beyond Bank's CIO exits
03
Feb
2026

Beyond Bank’s CIO exits – iTnews

Beyond Bank’s CIO Stevie-Ann Dovico has left after a bit over two years leading technology at the organisation. Stevie-Ann Dovico…

National cyber director solicits industry help in fixing regulations, threat information-sharing
03
Feb
2026

National cyber director solicits industry help in fixing regulations, threat information-sharing

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. WASHINGTON — The…

Beware of Fake Dropbox Phishing Attack that Harvest Login credentials
03
Feb
2026

Beware of Fake Dropbox Phishing Attack that Harvest Login credentials

Cybercriminals are launching a dangerous phishing campaign that tricks users into giving away their login credentials by impersonating Dropbox. This…

Op Neusploit: Russian APT28 Uses Microsoft Office Flaw in Malware Attacks
03
Feb
2026

Russian APT28 Uses Microsoft Office Flaw in Malware Attacks – Hackread – Cybersecurity News, Data Breaches, AI, and More

A targeted cyberattack campaign has been uncovered by researchers at Zscaler ThreatLabz. The operation, which the firm has named Operation…

National Cyber Director wants help to cut cybersecurity regulations and renew CISA
03
Feb
2026

National Cyber Director wants help to cut cybersecurity regulations and renew CISA

The Trump administration needs help from industry to reduce the cybersecurity regulatory burden and to back important cyber legislation on…

Mozilla Unveils Kill Switch to disable all Firefox AI features
03
Feb
2026

Mozilla Unveils Kill Switch to disable all Firefox AI features

Firefox 148 introduces comprehensive AI controls, giving users greater control over artificial intelligence features built into the browser. The new…

Bondu
03
Feb
2026

An AI plush toy exposed thousands of private chats with children

Bondu’s AI plush toy exposed a web console that let anyone with a Gmail account read about 50,000 private chats…

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
03
Feb
2026

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

Ravie LakshmananFeb 03, 2026Artificial Intelligence / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon,…

Infosecurity Europe launches cyber security startups stream
03
Feb
2026

Infosecurity Europe launches cyber security startups stream

The Infosecurity Europe event, being held in London in June, has announced a cyber security startups stream. Event organiser RX…

Salesloft Drift integration restored after probe reveals monthslong GitHub account compromise
03
Feb
2026

Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts

Security teams are scrambling Tuesday as two critical vulnerabilities in Ivanti Endpoint Manager Mobile are facing exploitation attempts.  Ivanti issued…

Iron Mountain
03
Feb
2026

Data breach mostly limited to marketing materials

Iron Mountain, a leading data storage and recovery services company, says that a recent breach claimed by the Everest extortion…