Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems

A new cyber-espionage threat group dubbed Amaranth-Dragon. Active throughout 2025, this group has launched highly targeted attacks against government and law…

05
Feb
2026

AI is driving a new kind of phishing at scale

Email remains a primary entry point for attackers, and security teams continue to manage high volumes of malicious messages that…

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture
05
Feb
2026

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture

A sophisticated new threat has surfaced in the wild, identified as the DesckVB RAT version 2.9. This modular Remote Access…

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites
05
Feb
2026

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites

A new cyber campaign where attackers are hijacking web servers to redirect visitors to malicious websites . The campaign targets…

05
Feb
2026

Smart glasses are back, privacy issues included

AI smart glasses are the latest addition to fashion, and they include a camera, a microphone, AI, and privacy risks….

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
05
Feb
2026

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation…

05
Feb
2026

Incognito Market Operator Gets 30-Year Prison Term

The 30-year prison sentence handed to Rui-Siang Lin, the operator of the infamous Incognito Market, is more than just another…

Here’s what you should know
05
Feb
2026

Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for…

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit
05
Feb
2026

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit

A sophisticated new cyber threat has emerged within the digital advertising ecosystem, specifically targeting users through the vast reach of…

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit
05
Feb
2026

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit

A new, sophisticated malvertising campaign targeting users in the United States. This attack leverages Facebook’s massive paid advertising platform to…

05
Feb
2026

Cybersecurity planning keeps moving toward whole-of-society models

National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical…

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
05
Feb
2026

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Ravie LakshmananFeb 05, 2026Web Security / Vulnerability Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that…