ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details
04
Feb
2026

ValleyRAT Mimic as LINE Installer Attacking Users to Steal Login Details

A sophisticated malware campaign has surfaced where threat actors are distributing the ValleyRAT backdoor disguised as a legitimate installer for…

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware
04
Feb
2026

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware

Notepad++, a widely used text editor among developers, became the target of a sophisticated supply chain attack that compromised its…

Hacker
04
Feb
2026

EDR killer tool uses signed kernel driver from forensic software

Hackers are abusing a legitimate but long-revoked EnCase kernel driver in an EDR killer that can detect 59 security tools in…

Hackers Using AI to Get AWS Admin Access Within 10 Minutes
04
Feb
2026

Hackers Using AI to Get AWS Admin Access Within 10 Minutes

AWS Admin Access in Minutes Threat actors leveraging artificial intelligence tools have compressed the cloud attack lifecycle from hours to…

TP-Link Vulnerabilities Let Hackers Take Full Control of Devices
04
Feb
2026

TP-Link Vulnerabilities Let Hackers Take Full Control of Devices

TP-Link has disclosed multiple critical authenticated command injection vulnerabilities affecting the Archer BE230 v1.2 Wi-Fi router, enabling attackers with administrative…

What's In A Company Name? 10X Your Cybersecurity
04
Feb
2026

Ransomware Damage To Cost The World $74B In 2026

Cybersecurity Ventures publishes a chart at RansomwareCost.com containing our calculations of global ransomware damage cost predictions from 2015 to 2031. For this…

Grok deepfake
04
Feb
2026

Grok continues producing sexualized images after promised fixes

Journalists decided to test whether the Grok chatbot still generates non‑consensual sexualized images, even after xAI, Elon Musk’s artificial intelligence…

Threat Actors Abuse Microsoft & Google Platforms to Attack Enterprise Users
04
Feb
2026

Threat Actors Abuse Microsoft & Google Platforms to Attack Enterprise Users

Enterprise security teams are facing a sophisticated new challenge as cybercriminals increasingly exploit trusted cloud platforms to launch phishing attacks….

New AI-Powered Threat Allows Hackers to Gain AWS Admin Access in Minutes
04
Feb
2026

New AI-Powered Threat Allows Hackers to Gain AWS Admin Access in Minutes

A highly sophisticated offensive cloud operation targeting an AWS environment.The attack was notable for its extreme speed taking less than…

MomentProof Deploys Patented Digital Asset Protection
04
Feb
2026

MomentProof Deploys Patented Digital Asset Protection

MomentProof Deploys Patented Digital Asset Protection Notice: Function WP_Scripts::add was called incorrectly. The script with the handle “powerkit” was enqueued…

Windows utility
04
Feb
2026

Microsoft rolls out native Sysmon monitoring in Windows 11

Microsoft has started rolling out built-in Sysmon functionality to some Windows 11 systems enrolled in the Windows Insider program. Microsoft…

CISA Warns of GitLab Community and Enterprise Editions SSRF Vulnerability Exploited in Attacks
04
Feb
2026

CISA Warns of GitLab Community and Enterprise Editions SSRF Vulnerability Exploited in Attacks

CISA Warns GitLab SSRF Vulnerability Exploit A critical GitLab vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog….