Securing the Mid-Market Across the Complete Threat Lifecycle
02
Feb
2026

Securing the Mid-Market Across the Complete Threat Lifecycle

The Hacker NewsFeb 02, 2026Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative…

02
Feb
2026

Benefits Of Executive Monitoring Platforms For Business Growth

When a CEO’s deepfake appears in a fraudulent investor call, when stolen credentials surface on dark web marketplaces, or when…

DLL Hijacking via URL files
02
Feb
2026

DLL Hijacking via URL files

This blogpost describes how I got annoyed by vulnerabilities in 3rd party Windows applications, which allowed to execute local files…

Gakido CRLF Injection Vulnerability Let Attackers Bypass Security Controls
02
Feb
2026

Gakido CRLF Injection Vulnerability Let Attackers Bypass Security Controls

A critical vulnerability in Gakido, an HTTP client library by HappyHackingSpace, has been discovered that allows attackers to inject arbitrary…

Arsink RAT Targets Android Devices to Steal Sensitive Data and Enable Remote Access
02
Feb
2026

Arsink RAT Targets Android Devices to Steal Sensitive Data and Enable Remote Access

Arsink is a cloud-native Android Remote Access Trojan (RAT) that steals sensitive data and grants attackers deep control over infected…

Notepad++ fixed updater bugs that allowed malicious update hijacking
02
Feb
2026

Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates

Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates Pierluigi Paganini February 02, 2026 Notepad++ maintainer says nation-state attackers hijacked…

InsertScript: Adobe Reader - PDF callback via XSLT stylesheet in XFA
02
Feb
2026

InsertScript: Adobe Reader – PDF callback via XSLT stylesheet in XFA

I have seen on twitter that there is use for another PDF callback Proof-of-Concept in Adobe Reader. Last year a…

New Stealthy Fileless Linux Malware 'ShadowHS' Emphasizes Automated Propagation
02
Feb
2026

New Stealthy Fileless Linux Malware ‘ShadowHS’ Emphasizes Automated Propagation

Security teams defending Linux environments now face a sophisticated threat designed to evade traditional detection. A newly uncovered fileless malware…

Windows 11 Introduces New Feature to Block Unauthorized Access to System Files
02
Feb
2026

Windows 11 Introduces New Feature to Block Unauthorized Access to System Files

Microsoft has released KB5074105, a critical preview update for Windows 11 versions 25H2 and 24H2 (OS Builds 26200.7705 and 26100.7705),…

02
Feb
2026

Russian APT28 Exploit Zero-Day Hours After Microsoft Discloses Office Vulnerability

Ukraine’s cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of public disclosure, targeting government agencies with…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 70
02
Feb
2026

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

InsertScript: Libreoffice (CVE-2018-16858) - Remote Code Execution via Macro/Event execution
02
Feb
2026

InsertScript: Libreoffice (CVE-2018-16858) – Remote Code Execution via Macro/Event execution

I started to have a look at Libreoffice and discovered a way to achieve remote code execution as soon as…