02
Feb
2026

Russian APT28 Exploit Zero-Day Hours After Microsoft Discloses Office Vulnerability

Ukraine’s cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of public disclosure, targeting government agencies with…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 70
02
Feb
2026

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

InsertScript: Libreoffice (CVE-2018-16858) - Remote Code Execution via Macro/Event execution
02
Feb
2026

InsertScript: Libreoffice (CVE-2018-16858) – Remote Code Execution via Macro/Event execution

I started to have a look at Libreoffice and discovered a way to achieve remote code execution as soon as…

We moved fast and broke things. It’s time for a change.
02
Feb
2026

We moved fast and broke things. It’s time for a change.

The phrase “Move fast and break things” is a guiding philosophy in the technology industry. The phrase was coined by…

China moves to boost cybercrime penalties by adding exit ban after sentences
02
Feb
2026

China moves to boost cybercrime penalties by adding exit ban after sentences

China is looking to escalate measures against cybercriminals operating inside and outside its borders by banning convicted citizens from leaving…

Windows 11
02
Feb
2026

Microsoft fixes bug causing password sign-in option to disappear

Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options…

ICE and Qatari Security Forces at the Winter Olympics Put Italians on Edge
02
Feb
2026

ICE and Qatari Security Forces at the Winter Olympics Put Italians on Edge

With less than a week to go until the start of the 2026 Milano Cortina Winter Olympics in Italy, the…

New Stealthy Fileless Linux Malware Spreads Automatically
02
Feb
2026

New Stealthy Fileless Linux Malware Spreads Automatically

A sophisticated fileless Linux malware framework, ShadowHS, that represents a significant evolution in post-exploitation tooling. Unlike traditional malware binaries, ShadowHS…

02
Feb
2026

Microsoft sets a path to switch off NTLM across Windows

Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger,…

InsertScript: ImageMagick - Shell injection via PDF password
02
Feb
2026

InsertScript: ImageMagick – Shell injection via PDF password

“Use ImageMagick® to create, edit, compose, or convert bitmap images. It can read and write images in a variety of…

Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note
02
Feb
2026

Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note

Threat actors are actively targeting internet-exposed MongoDB instances in large-scale automated ransomware campaigns. The attacks follow a consistent pattern: attackers…

Notepad++ Users Targeted After State-Backed Attackers Hijack Update Servers
02
Feb
2026

Notepad++ Users Targeted After State-Backed Attackers Hijack Update Servers

Notepad++ fell victim to a sophisticated supply chain attack orchestrated by state-sponsored threat actors who compromised its update infrastructure over…