Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device
05
Feb
2026

Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device

TP-Link OS Command Injection Vulnerabilities TP-Link has released urgent firmware updates for its Archer BE230 Wi-Fi 7 routers to address…

CBA sets up 'GenAI Network' community
05
Feb
2026

CBA sets up dedicated AI risk committee for governance

The Commonwealth Bank of Australia (CBA) has classified artificial intelligence (AI) as a “material risk type” under its risk management…

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks
05
Feb
2026

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks

VMware ESXi 0-day Ransomware Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently confirmed that ransomware groups are actively…

ANZ deploys Agentforce to supercharge new CRM system
05
Feb
2026

ANZ deploys Agentforce to supercharge new CRM system

ANZ Banking Group has switched AI agents in a new Salesforce customer relationship management platform used by its business bankers…

Inconsistent action leaving children exposed to online sexual exploitation
05
Feb
2026

Inconsistent action leaving children exposed to online sexual exploitation

UNICEF Australia has warned that inconsistent action by technology companies is leaving children exposed to online sexual exploitation, following the…

Top AI Tools for Red Teaming in 2026
05
Feb
2026

Top AI Tools for Red Teaming in 2026

Red teaming has undergone a radical evolution. Modern organizations can no longer rely solely on human creativity or outdated attack…

Ransomware IAB abuses EDR for stealthy malware execution
05
Feb
2026

Hackers compromise NGINX servers to redirect user traffic

A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker’s…

The European offensive against encrypted phone evidence
05
Feb
2026

The European offensive against encrypted phone evidence

Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone…

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
05
Feb
2026

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks Pierluigi Paganini February 04, 2026 Ransomware groups now exploit VMware…

Microsoft users warned over privilege elevation flaw
05
Feb
2026

SolarWinds RCE bug makes Cisa list as exploitation spreads

A critical vulnerability in SolarWinds’ Web Help Desk service has been added to the US Cybersecurity and Infrastructure Security Agency’s…

n8n
05
Feb
2026

Critical n8n flaws disclosed along with public exploits

Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and taking…

Intersec Dubai highlights why AI has become critical in the race against cyber attackers
05
Feb
2026

Smaller, safer AI models may be key to unlocking business value

Artificial intelligence (AI) I hasn’t just hit the big leagues; it is the big leagues. Over the course of 2025, AI was embedded into…