Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security
05
Feb
2026

Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security

EDR Killer Via SonicWall SSLVPN Threat actors are actively leveraging compromised SonicWall SSLVPN credentials to breach networks and deploy a…

New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture
05
Feb
2026

New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture

A sophisticated strain of the DeskVB Remote Access Trojan (RAT) has been identified in the wild, showcasing a highly modular…

05
Feb
2026

Varonis acquires AllTrue.ai to enable safe, compliant AI at scale

Varonis has acquired AllTrue.ai to help organizations adopt safe, compliant and trustworthy AI at scale. AllTrue.ai brings real-time visibility and…

DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information
05
Feb
2026

DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information

A new ransomware operation known as DragonForce has emerged as a major threat to organizations worldwide since its appearance in…

APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies
05
Feb
2026

APT28 Hackers Exploit Microsoft Office Vulnerability to Target Government Agencies

Russian state-sponsored hackers, known as APT28 or Fancy Bear, have launched a new wave of cyberattacks targeting government and military…

APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies
05
Feb
2026

APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies

Russian state-sponsored actors known as APT28 have initiated a sophisticated cyber espionage campaign targeting high-value government and military entities across…

Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploits WinRAR Vulnerability for Persistent Access to Victim Systems

A new cyber-espionage threat group dubbed Amaranth-Dragon. Active throughout 2025, this group has launched highly targeted attacks against government and law…

05
Feb
2026

AI is driving a new kind of phishing at scale

Email remains a primary entry point for attackers, and security teams continue to manage high volumes of malicious messages that…

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture
05
Feb
2026

New DesckVB RAT with Multi-stage Infection Chain and Plugin-Based Architecture

A sophisticated new threat has surfaced in the wild, identified as the DesckVB RAT version 2.9. This modular Remote Access…

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites
05
Feb
2026

Threat Actors Exploiting NGINX Servers to Redirect Web Traffic to Malicious Sites

A new cyber campaign where attackers are hijacking web servers to redirect visitors to malicious websites . The campaign targets…

05
Feb
2026

Smart glasses are back, privacy issues included

AI smart glasses are the latest addition to fashion, and they include a camera, a microphone, AI, and privacy risks….

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
05
Feb
2026

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Ravie LakshmananFeb 05, 2026Workflow Automation / Vulnerability A new, critical security vulnerability has been disclosed in the n8n workflow automation…