HoneyMyte Hacker Group Expands CoolClient Malware With New Advanced Toolset
04
Feb
2026

HoneyMyte Hacker Group Expands CoolClient Malware With New Advanced Toolset

The HoneyMyte APT group, also known as Mustang Panda and Bronze President, continues expanding its cyber-espionage operations across Asia and…

Analysis: Dangerous web traffic hijacking campaign
04
Feb
2026

Analysis: Dangerous web traffic hijacking campaign

Datadog Security Research has uncovered an active web traffic hijacking campaign that abuses malicious NGINX configurations to intercept and reroute…

Coinbase
04
Feb
2026

Coinbase confirms insider breach linked to leaked support tool screenshots

Coinbase has confirmed an insider breach after a contractor improperly accessed the data of approximately thirty customers, which BleepingComputer has…

Hackers Exploiting React Server Components Vulnerability in the Wild to Deploy Malicious Payloads
04
Feb
2026

Hackers Exploiting React Server Components Vulnerability in the Wild to Deploy Malicious Payloads

React Server Vulnerability Exploited Two months following the disclosure of CVE-2025-55182, exploitation activity targeting React Server Components has evolved from…

Fake Party Invites Lure Victims Into Installing Malicious Remote Access Tools
04
Feb
2026

Fake Party Invites Lure Victims Into Installing Malicious Remote Access Tools

A sophisticated social engineering campaign targeting Windows users across the UK, using fake event invitations to silently install ScreenConnect a…

Microsoft Takes Major Security Step by Disabling NTLM Authentication by Default
04
Feb
2026

Microsoft Takes Major Security Step by Disabling NTLM Authentication by Default

Microsoft is making a significant move to strengthen Windows security by phasing out NTLM (New Technology LAN Manager). This legacy…

ASUS Discontinues “File Shredder” Feature to Patch Critical Vulnerability
04
Feb
2026

ASUS Discontinues “File Shredder” Feature to Patch Critical Vulnerability

ASUS has discontinued the File Shredder feature in its Business Manager software following the discovery of a critical security vulnerability,…

PDFly Variant Uses Custom PyInstaller Tweaks to Obfuscate Payload, Thwarting Analysis
04
Feb
2026

PDFly Variant Uses Custom PyInstaller Tweaks to Obfuscate Payload, Thwarting Analysis

A new malware variant dubbed “PDFly” is abusing a heavily modified PyInstaller stub to hide its Python bytecode, forcing analysts…

Derek B. Johnson
04
Feb
2026

Cantwell claims telecoms blocked release of Salt Typhoon report 

More than a year after national security officials revealed that Chinese hackers had systematically infiltrated U.S. telecommunications networks, the top…

Fake Compliance Emails Weaponize Word and PDF Attachments to Steal Sensitive Data
04
Feb
2026

Fake Compliance Emails Weaponize Word and PDF Attachments to Steal Sensitive Data

A newly observed phishing campaign is abusing fake “audit/compliance confirmation” emails to target macOS users and steal highly sensitive data….

Fake Dropbox Phishing Campaign Targets Users, Steals Login Credentials
04
Feb
2026

Fake Dropbox Phishing Campaign Targets Users, Steals Login Credentials

A sophisticated phishing campaign that uses a multi-stage approach to bypass email filtering and content-scanning systems. The attack exploits trusted…

04
Feb
2026

Ivanti’s EPMM is under active attack, thanks to two critical zero-days

Attackers are again focusing on a familiar target in the network edge space, actively exploiting two critical zero-day vulnerabilities in…