Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11
05
Feb
2026

Microsoft to Integrate Sysmon Threat Detection Natively into Windows 11

Microsoft has officially begun rolling out native System Monitor (Sysmon) functionality to Windows 11, marking a significant shift for threat…

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems
05
Feb
2026

Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems

A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement…

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter
05
Feb
2026

iTnews Executive Retreats: Creating Space for Leadership Conversations that Matter

Senior technology leaders are operating in increasingly complex environments – larger remits, higher accountability and less space to step back…

Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device
05
Feb
2026

Multiple TP-Link OS Command Injection Vulnerabilities Let Attackers Gain Admin Control of the Device

TP-Link OS Command Injection Vulnerabilities TP-Link has released urgent firmware updates for its Archer BE230 Wi-Fi 7 routers to address…

CBA sets up 'GenAI Network' community
05
Feb
2026

CBA sets up dedicated AI risk committee for governance

The Commonwealth Bank of Australia (CBA) has classified artificial intelligence (AI) as a “material risk type” under its risk management…

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks
05
Feb
2026

CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks

VMware ESXi 0-day Ransomware Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently confirmed that ransomware groups are actively…

ANZ deploys Agentforce to supercharge new CRM system
05
Feb
2026

ANZ deploys Agentforce to supercharge new CRM system

ANZ Banking Group has switched AI agents in a new Salesforce customer relationship management platform used by its business bankers…

Inconsistent action leaving children exposed to online sexual exploitation
05
Feb
2026

Inconsistent action leaving children exposed to online sexual exploitation

UNICEF Australia has warned that inconsistent action by technology companies is leaving children exposed to online sexual exploitation, following the…

Top AI Tools for Red Teaming in 2026
05
Feb
2026

Top AI Tools for Red Teaming in 2026

Red teaming has undergone a radical evolution. Modern organizations can no longer rely solely on human creativity or outdated attack…

Ransomware IAB abuses EDR for stealthy malware execution
05
Feb
2026

Hackers compromise NGINX servers to redirect user traffic

A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker’s…

The European offensive against encrypted phone evidence
05
Feb
2026

The European offensive against encrypted phone evidence

Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone…

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
05
Feb
2026

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks Pierluigi Paganini February 04, 2026 Ransomware groups now exploit VMware…