Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass
05
Feb
2026

Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass

Moxa has released a critical security advisory addressing a severe vulnerability affecting multiple series of its industrial Ethernet switches. Tracked…

Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers
05
Feb
2026

Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers

Researchers link a global DNS hijacking campaign against old home routers redirecting traffic through servers hosted by Aeza International, a…

05
Feb
2026

International sting dismantles illegal streaming empire serving millions

Actions by authorities from Italy, Romania, Spain, the United Kingdom, Canada, Kosovo and South Korea, supported by Eurojust and Europol,…

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
05
Feb
2026

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage The elusive Iranian threat group known as Infy (aka Prince of Persia) has…

Forget AGI, business leaders are still trying to figure out how to make AI work
05
Feb
2026

Forget AGI, business leaders are still trying to figure out how to make AI work

The dramatic progress of AI and its impact on both the economy and society at large dominated the conversation throughout…

05
Feb
2026

Substack Discloses Breach Exposing Its User Details After Four-Month Delay

Data accessed in October 2025 went undetected until February, affecting subscribers across the newsletter platform with no evidence of misuse…

Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers
05
Feb
2026

Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers

Threat Actors Hacking NGINX Servers A sophisticated campaign in which threat actors are stealthily compromising NGINX servers to redirect web…

LockBit 5.0 Unveils Cross-Platform Threats for Windows, Linux & ESXi Systems
05
Feb
2026

LockBit 5.0 Unveils Cross-Platform Threats for Windows, Linux & ESXi Systems

The inner workings of LockBit 5.0, a sophisticated ransomware variant targeting Windows, Linux, and VMware ESXi systems simultaneously. This latest…

05
Feb
2026

Why a decade-old EnCase driver still works as an EDR killer

Attackers are leaning on a new EDR killer malware that can shut down 59 widely used endpoint security products by…

Flock cameras shared license plate data without permission
05
Feb
2026

Flock cameras shared license plate data without permission

Mountain View, California, pulled the plug on its entire license plate reader camera network this week. It discovered that Flock…

The Buyer’s Guide to AI Usage Control
05
Feb
2026

The Buyer’s Guide to AI Usage Control

Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and…

What should platform engineering look like?
05
Feb
2026

Half of Google’s software development now AI-generated

As much as half of all the code produced at Alphabet, the parent company of Google, is being generated by…