APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies
05
Feb
2026

APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies

Russian state-sponsored hackers, known as APT28 or Fancy Bear, have launched a new wave of cyberattacks targeting government and military…

APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies
05
Feb
2026

APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies

Russian state-sponsored actors known as APT28 have initiated a sophisticated cyber espionage campaign targeting high-value government and military entities across…

Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems

A new cyber-espionage threat group dubbed Amaranth-Dragon. Active throughout 2025, this group has launched highly targeted attacks against government and law…

05
Feb
2026

AI is driving a new kind of phishing at scale

Email remains a primary entry point for attackers, and security teams continue to manage high volumes of malicious messages that…

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture
05
Feb
2026

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture

A sophisticated new threat has surfaced in the wild, identified as the DesckVB RAT version 2.9. This modular Remote Access…

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites
05
Feb
2026

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites

A new cyber campaign where attackers are hijacking web servers to redirect visitors to malicious websites . The campaign targets…

05
Feb
2026

Smart glasses are back, privacy issues included

AI smart glasses are the latest addition to fashion, and they include a camera, a microphone, AI, and privacy risks….

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
05
Feb
2026

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation…

05
Feb
2026

Incognito Market Operator Gets 30-Year Prison Term

The 30-year prison sentence handed to Rui-Siang Lin, the operator of the infamous Incognito Market, is more than just another…

Here’s what you should know
05
Feb
2026

Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for…

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit
05
Feb
2026

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit

A sophisticated new cyber threat has emerged within the digital advertising ecosystem, specifically targeting users through the vast reach of…

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit
05
Feb
2026

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit

A new, sophisticated malvertising campaign targeting users in the United States. This attack leverages Facebook’s massive paid advertising platform to…