Interlock ransomware operators have been observed using a new process‑killing tool that abuses a zero‑day flaw in a gaming anti‑cheat…
Some software providers have decided to lead by example and offer users a choice about the Artificial Intelligence (AI) features…
Microsoft: Info-Stealing malware expands from Windows to macOS Pierluigi Paganini February 04, 2026 Microsoft warns info-stealing attacks are expanding from…
A Taiwanese man was sentenced to 30 years in prison for operating Incognito Market, one of the world’s largest online…
Teams Chats Image Retrieval Microsoft has resolved an outage affecting inline images in Microsoft Teams chats, restoring normal functionality for…
A new threat called PhantomVAI, a custom “loader” used to launch cyberattacks worldwide. A loader is a type of malicious…
The Hacker NewsFeb 04, 2026Identity Security / Security Operations An innovative approach to discovering, analyzing, and governing identity usage beyond…
CISA Warns SolarWinds Web Help Desk Vulnerability An urgent warning regarding a critical remote code execution (RCE) vulnerability in SolarWinds…
A severe vulnerability affecting ASUSTOR Network Attached Storage (NAS) devices has been disclosed, potentially allowing unauthenticated attackers to seize full…
Researchers at Tenable have disclosed two vulnerabilities, collectively referred to as “LookOut,” affecting Google Looker. Because the business intelligence platform…
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what…
Alisa Viejo, United States, February 4th, 2026, CyberNewsWire One Identity, a leader in unified identity security, today announced the appointment of…
