ShadowSyndicate Using Server Transition Technique in Ransomware Attacks
05
Feb
2026

ShadowSyndicate Using Server Transition Technique in Ransomware Attacks

ShadowSyndicate, a malicious activity cluster first identified in 2022, has evolved its infrastructure management techniques by adopting a server transition…

n8n Vulnerability Allows Remote Attackers to Hijack Systems via Malicious Workflow Execution
05
Feb
2026

n8n Vulnerability Allows Remote Attackers to Hijack Systems via Malicious Workflow Execution

n8n has released urgent security updates to address a critical vulnerability that exposes host systems to Remote Code Execution (RCE)….

Common Crypto Scams and How to Protect Your Funds in 2026
05
Feb
2026

Common Crypto Scams and How to Protect Your Funds in 2026

Online Scams have become a leading and highly lucrative form of crime worldwide, both within and beyond the cryptocurrency industry….

PDF and RAT
05
Feb
2026

Open the wrong “PDF” and attackers gain remote access to your PC

Cybercriminals behind a campaign dubbed DEAD#VAX are taking phishing one step further by delivering malware inside virtual hard disks that…

WatchGuard VPN Client for Windows Vulnerability Enables Command Execution With SYSTEM Privileges
05
Feb
2026

WatchGuard VPN Client for Windows Vulnerability Enables Command Execution With SYSTEM Privileges

WatchGuard VPN Client Windows Vulnerability A security advisory addressing a significant privilege-escalation vulnerability affecting its Mobile VPN with an IPSec…

ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks
05
Feb
2026

ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks

ShadowSyndicate, a sophisticated cybercrime cluster first identified in 2023, has evolved its infrastructure management tactics by implementing a previously unreported…

Should I Stay Or Should I Go?
05
Feb
2026

Should I Stay Or Should I Go?

Lack of access to executives and the board is a red flag and a top reason why chief information security officers…

Why sovereign and agentic AI will define next phase of Middle East’s digital transformation
05
Feb
2026

Why sovereign and agentic AI will define next phase of Middle East’s digital transformation

Digital transformation in the Middle East is reaching a critical turning point. After years of rapid experimentation with artificial intelligence…

Cyberattackers Use Fake RTO Challan Alerts to Spread Android Malware
05
Feb
2026

Cyberattackers Use Fake RTO Challan Alerts to Spread Android Malware

Indian users’ trust in government services through a sophisticated Android malware campaign that impersonates Regional Transport Office (RTO) challan notifications….

05
Feb
2026

Police shut down global DDoS operation, arrest 20-year-old

Police officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) have arrested a 20-year-old man suspected of carrying out global…

Substack
05
Feb
2026

Newsletter platform Substack notifies users of data breach

Newsletter platform Substack is notifying users of a data breach after attackers stole their email addresses and phone numbers in…

Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass
05
Feb
2026

Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass

Moxa has released a critical security advisory addressing a severe vulnerability affecting multiple series of its industrial Ethernet switches. Tracked…