InsertScript: PDF - How to steal PDFs by injecting JavaScript
02
Feb
2026

InsertScript: PDF – How to steal PDFs by injecting JavaScript

Intro Quite some time has passed since my last blog post, so I decided to present a nice feature of…

Autonomous AI Agents Are Becoming the New Operating System of Cybercrime
02
Feb
2026

Autonomous AI Agents Are Becoming the New Operating System of Cybercrime

The cybersecurity landscape has entered a dangerous new phase where autonomous AI agents are transforming from simple automation tools into…

1-Click Flaw in ClawDBot Allows Remote Code Execution
02
Feb
2026

1-Click Flaw in ClawDBot Allows Remote Code Execution

A high-severity authentication bypass vulnerability has been discovered in ClawDBot, a popular npm package, enabling attackers to achieve remote code…

02
Feb
2026

How state-sponsored attackers hijacked Notepad++ updates

Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and…

Securing the Mid-Market Across the Complete Threat Lifecycle
02
Feb
2026

Securing the Mid-Market Across the Complete Threat Lifecycle

The Hacker NewsFeb 02, 2026Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative…

02
Feb
2026

Benefits Of Executive Monitoring Platforms For Business Growth

When a CEO’s deepfake appears in a fraudulent investor call, when stolen credentials surface on dark web marketplaces, or when…

DLL Hijacking via URL files
02
Feb
2026

DLL Hijacking via URL files

This blogpost describes how I got annoyed by vulnerabilities in 3rd party Windows applications, which allowed to execute local files…

Gakido CRLF Injection Vulnerability Let Attackers Bypass Security Controls
02
Feb
2026

Gakido CRLF Injection Vulnerability Let Attackers Bypass Security Controls

A critical vulnerability in Gakido, an HTTP client library by HappyHackingSpace, has been discovered that allows attackers to inject arbitrary…

Arsink RAT Targets Android Devices to Steal Sensitive Data and Enable Remote Access
02
Feb
2026

Arsink RAT Targets Android Devices to Steal Sensitive Data and Enable Remote Access

Arsink is a cloud-native Android Remote Access Trojan (RAT) that steals sensitive data and grants attackers deep control over infected…

Notepad++ fixed updater bugs that allowed malicious update hijacking
02
Feb
2026

Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates

Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates Pierluigi Paganini February 02, 2026 Notepad++ maintainer says nation-state attackers hijacked…

InsertScript: Adobe Reader - PDF callback via XSLT stylesheet in XFA
02
Feb
2026

InsertScript: Adobe Reader – PDF callback via XSLT stylesheet in XFA

I have seen on twitter that there is use for another PDF callback Proof-of-Concept in Adobe Reader. Last year a…

New Stealthy Fileless Linux Malware 'ShadowHS' Emphasizes Automated Propagation
02
Feb
2026

New Stealthy Fileless Linux Malware ‘ShadowHS’ Emphasizes Automated Propagation

Security teams defending Linux environments now face a sophisticated threat designed to evade traditional detection. A newly uncovered fileless malware…