Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
05
Feb
2026

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Ravie LakshmananFeb 05, 2026Web Security / Vulnerability Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that…

WatchGuard VPN Client Flaw on Windows Enables SYSTEM‑Level Command Execution
05
Feb
2026

WatchGuard VPN Client Flaw on Windows Enables SYSTEM‑Level Command Execution

WatchGuard has released a critical security update for its Mobile VPN with IPSec client for Windows to address a privilege…

05
Feb
2026

Measuring AI use becomes a business requirement

Enterprise teams already run dozens of AI tools across daily work. Usage stretches from code generation and analytics to customer…

Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands
05
Feb
2026

Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands

The cybersecurity landscape has darkened with the sophisticated evolution of the KongTuke campaign. Active since mid-2025, this threat actor group…

Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11
05
Feb
2026

Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11

Microsoft has officially begun rolling out native System Monitor (Sysmon) functionality to Windows 11, marking a significant shift for threat…

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems

A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement…

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter
05
Feb
2026

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter

Senior technology leaders are operating in increasingly complex environments – larger remits, higher accountability and less space to step back…

Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device
05
Feb
2026

Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device

TP-Link OS Command Injection Vulnerabilities TP-Link has released urgent firmware updates for its Archer BE230 Wi-Fi 7 routers to address…

CBA sets up 'GenAI Network' community
05
Feb
2026

CBA sets up dedicated AI risk committee for governance

The Commonwealth Bank of Australia (CBA) has classified artificial intelligence (AI) as a “material risk type” under its risk management…

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks
05
Feb
2026

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks

VMware ESXi 0-day Ransomware Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently confirmed that ransomware groups are actively…

ANZ deploys Agentforce to supercharge new CRM system
05
Feb
2026

ANZ deploys Agentforce to supercharge new CRM system

ANZ Banking Group has switched AI agents in a new Salesforce customer relationship management platform used by its business bankers…

Inconsistent action leaving children exposed to online sexual exploitation
05
Feb
2026

Inconsistent action leaving children exposed to online sexual exploitation

UNICEF Australia has warned that inconsistent action by technology companies is leaving children exposed to online sexual exploitation, following the…