MomentProof Launches Patented Digital Asset Protection
04
Feb
2026

MomentProof Launches Patented Digital Asset Protection

Washington, DC, February 4th, 2026, CyberNewsWire MomentProof, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced…

04
Feb
2026

Incognito dark web drug market operator gets 30 years in prison

Rui-Siang Lin, a Taiwanese national, was sentenced to 30 years in U.S. federal prison for operating Incognito Market, one of…

GitLab
04
Feb
2026

CISA warns of five-year-old GitLab flaw exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab vulnerability…

Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware
04
Feb
2026

Supply Chain Attack Abused Notepad++ Update Infrastructure to Deliver Targeted Malware

The developers of Notepad++ disclosed a critical security breach on February 2, 2026, affecting their update infrastructure. The popular text…

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments
04
Feb
2026

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments

Active Directory serves as the central repository for an organization’s authentication infrastructure, making it a prime target for sophisticated threat…

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials
04
Feb
2026

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials Notice: Function WP_Scripts::add was called incorrectly. The script with…

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
04
Feb
2026

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law…

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
04
Feb
2026

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS Pierluigi Paganini February 04, 2026 GreyNoise spotted a…

New Amaranth Dragon cyberespionage group exploits WinRAR flaw
04
Feb
2026

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks…

ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details
04
Feb
2026

ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details

A sophisticated malware campaign has surfaced where threat actors are distributing the ValleyRAT backdoor disguised as a legitimate installer for…

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware
04
Feb
2026

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware

Notepad++, a widely used text editor among developers, became the target of a sophisticated supply chain attack that compromised its…

Hacker
04
Feb
2026

EDR killer tool uses signed kernel driver from forensic software

Hackers are abusing a legitimate but long-revoked EnCase kernel driver in an EDR killer that can detect 59 security tools in…