Paris raid on X focuses on child abuse material allegations
04
Feb
2026

Paris raid on X focuses on child abuse material allegations

Paris raid on X focuses on child abuse material allegations Pierluigi Paganini February 04, 2026 French prosecutors raided X offices…

Cyber Sword
04
Feb
2026

The Double-Edged Sword of Non-Human Identities

In a sweeping analysis conducted in late 2025, Flare researchers uncovered more than 10,000 Docker Hub container images leaking secrets…

MomentProof Launches Patented Digital Asset Protection
04
Feb
2026

MomentProof Launches Patented Digital Asset Protection

Washington, DC, February 4th, 2026, CyberNewsWire MomentProof, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced…

MomentProof Launches Patented Digital Asset Protection
04
Feb
2026

MomentProof Launches Patented Digital Asset Protection

Washington, DC, February 4th, 2026, CyberNewsWire MomentProof, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced…

04
Feb
2026

Incognito dark web drug market operator gets 30 years in prison

Rui-Siang Lin, a Taiwanese national, was sentenced to 30 years in U.S. federal prison for operating Incognito Market, one of…

GitLab
04
Feb
2026

CISA warns of five-year-old GitLab flaw exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab vulnerability…

Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware
04
Feb
2026

Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware

The developers of Notepad++ disclosed a critical security breach on February 2, 2026, affecting their update infrastructure. The popular text…

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments
04
Feb
2026

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments

Active Directory serves as the central repository for an organization’s authentication infrastructure, making it a prime target for sophisticated threat…

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials
04
Feb
2026

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials Notice: Function WP_Scripts::add was called incorrectly. The script with…

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
04
Feb
2026

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law…

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
04
Feb
2026

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS Pierluigi Paganini February 04, 2026 GreyNoise spotted a…

New Amaranth Dragon cyberespionage group exploits WinRAR flaw
04
Feb
2026

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks…