05
Feb
2026

Incognito Market Operator Gets 30-Year Prison Term

The 30-year prison sentence handed to Rui-Siang Lin, the operator of the infamous Incognito Market, is more than just another…

Here’s what you should know
05
Feb
2026

Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for…

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit
05
Feb
2026

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push Tech Support #Scam Kit

A sophisticated new cyber threat has emerged within the digital advertising ecosystem, specifically targeting users through the vast reach of…

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit
05
Feb
2026

New 3-Step Malvertising Chain Exploits Facebook Ads to Promote Tech Support Scam Kit

A new, sophisticated malvertising campaign targeting users in the United States. This attack leverages Facebook’s massive paid advertising platform to…

05
Feb
2026

Cybersecurity planning keeps moving toward whole-of-society models

National governments already run cybersecurity through a mix of ministries, regulators, law enforcement, and private operators that own most critical…

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
05
Feb
2026

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Ravie LakshmananFeb 05, 2026Web Security / Vulnerability Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that…

WatchGuard VPN Client Flaw on Windows Enables SYSTEM‑Level Command Execution
05
Feb
2026

WatchGuard VPN Client Flaw on Windows Enables SYSTEM‑Level Command Execution

WatchGuard has released a critical security update for its Mobile VPN with IPSec client for Windows to address a privilege…

05
Feb
2026

Measuring AI use becomes a business requirement

Enterprise teams already run dozens of AI tools across daily work. Usage stretches from code generation and analytics to customer…

Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands
05
Feb
2026

Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands

The cybersecurity landscape has darkened with the sophisticated evolution of the KongTuke campaign. Active since mid-2025, this threat actor group…

Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11
05
Feb
2026

Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11

Microsoft has officially begun rolling out native System Monitor (Sysmon) functionality to Windows 11, marking a significant shift for threat…

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems

A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement…

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter
05
Feb
2026

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter

Senior technology leaders are operating in increasingly complex environments – larger remits, higher accountability and less space to step back…