Substack did not specify the number of users affected by the data breach – Read More –
DKnife is a Chinese made malware framework that targets Chinese-based users – Read More –
Flickr Notifies Users of Data Breach After External Partner Security Flaw – Hackread – Cybersecurity News, Data Breaches, AI and More
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery – The Hacker News
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to – … Read More “China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery – The Hacker News” »
17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down … Read More “CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk – The Hacker News” »
A Victorian school teacher was applying for ‘heaps of rentals’ online – then someone accessed his bank account – Data and computer security | The Guardian
Michael suspects personal information he submitted to rent application platforms was leaked online. And analysis shows millions of documents may also be at risk Get our breaking news email, free app or daily news podcast Michael* has spent the past two months trying to get his digital identity back. The 47-year-old Victorian school teacher was … Read More “A Victorian school teacher was applying for ‘heaps of rentals’ online – then someone accessed his bank account – Data and computer security | The Guardian” »
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities – The Hacker News
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with … Read More “Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities – The Hacker News” »
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use of mobile devices in business operations necessitates network security measures that are specifically – Read … Read More “How Samsung Knox Helps Stop Your Network Security Breach – The Hacker News” »
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below – @dydxprotocol/v4-client-js (npm) – 3.4.1, 1.22.1, 1.15.2, … Read More “Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware – The Hacker News” »
Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies – Read More –
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched on Thursday, comes with improved coding skills, including code review and debugging capabilities, along – … Read More “Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries – The Hacker News” »
National Threat Level: Blue (Guarded) This threat level is based on analysis by the Center for Internet Security® (CIS®) Operations, Intelligence, and Services (OIS) department covering the cyber threat landscape for Quarter 4 (Q4) of 2025. In calendar year 2025Q4, OIS published 26 Cybersecurity Advisories for critical severity high risk vulnerabilities in popular software applications … Read More “Threat Level – GUARDED – Cyber Threat Alert” »
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical record, and every… The post Industry-Aligned Cryptography by CryptoBind appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Substack Breach: 662,752 User Records Leaked on Cybercrime Forum – Hackread – Cybersecurity News, Data Breaches, AI and More
Substack confirms a breach after hacker accessed internal user records now circulating on crime forums, exposing emails, phone numbers, and account metadata. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire – GRAHAM CLULEY
He promised “the best security there is” to hundreds of thousands of drug buyers, while quietly making the kind of mistake that guaranteed a 30-year sentence. And maybe training police on cryptocurrency while running a running a vast Tor-hidden drug bazaar wasn’t such a good idea. Read more in my article on the Hot for … Read More “Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire – GRAHAM CLULEY” »
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it’s part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the botnet in the fourth … Read More “AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack – The Hacker News” »
A Cybersecurity and Infrastructure Security Agency order published Thursday directs federal agencies to stop using “edge devices” like firewalls and routers that their manufacturers no longer support. It’s a stab at tackling one of the most persistent and difficult-to-manage avenues of attack for hackers, a vector that has factored into some of the most consequential … Read More “CISA tells agencies to stop using unsupported edge devices – CyberScoop” »
A 23-year-old New York man allegedly affiliated with 764 was arrested and charged with receiving child sexual abuse material. Aaron Corey of Albany, N.Y., faces up to 20 years in prison for trafficking CSAM during a three-month period ending in December. Corey, also known as “Baggeth,” is accused of running multiple 764-related chats, seeking CSAM … Read More “Alleged 764 member arrested, charged with CSAM possession in New York – CyberScoop” »
In this excerpt of a TrendAI Research Services vulnerability report, Jonathan Lein and Simon Humbert of the TrendAI Research team detail a recently patched command injection vulnerability in the Arista NG Firewall. This bug was originally discovered by Gereon Huppertz and reported through the TrendAI Zero Day Initiative (ZDI) program. Successful exploitation could result in … Read More “CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall – Zero Day Initiative – Blog” »
macOS Users Hit by Python Infostealers Posing as AI Installers – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft details 3 Python Infostealers hitting macOS users via fake AI tools, Google ads, and Terminal tricks to steal passwords and crypto, then erase traces. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Common Crypto Scams and How to Protect Your Funds in 2026 – Hackread – Cybersecurity News, Data Breaches, AI and More
Crypto scams are surging worldwide, from pig butchering to fake trading platforms and deepfakes, draining victims while fraud teams struggle to keep up. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Godent Rolls Out Scanner-as-a-Service Model to Drive Digital Transformation in European Dentistry – Hackread – Cybersecurity News, Data Breaches, AI and More
Godent has announced the launch of its scanner-as-a-service program for European DSOs, combining free intraoral scanners with a fully integrated digital lab infrastructure to modernize dental workflows. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers – Hackread – Cybersecurity News, Data Breaches, AI and More
Compromised home routers in 30+ countries had DNS traffic redirected, sending users to malicious sites while normal browsing appeared unaffected. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate system features” to bypass traditional detection mechanisms and deploy a remote access trojan (RAT) known as AsyncRAT. “The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory … Read More “DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files – The Hacker News” »
Cellebrite data confirms digital evidence is now central to almost all cases – Read More –
Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests – Read More –
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories – The Hacker News
This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry … Read More “ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories – The Hacker News” »
Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation – Read More –
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends – The Hacker News
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of the month. “The threat actor stopped maintaining … Read More “Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends – The Hacker News” »
Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP) systems pose after a series of high-profile cyberattacks. The Jaguar Land Rover (JLR), incident in Sept. 2025 illustrates the severe consequences of such attacks. The cyberattack forced JLR … Read More “Why boards should be obsessed with their most ‘boring’ systems – CyberScoop” »
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result … Read More “The Buyer’s Guide to AI Usage Control – The Hacker News” »
Pindrop warns of 1210% increase in AI-powered fraud last year – Read More –
Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX – … Read More “Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign – The Hacker News” »
Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX – … Read More “Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign – The Hacker News” »
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows – The Hacker News
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical … Read More “Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows – The Hacker News” »
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows – The Hacker News
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical … Read More “Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows – The Hacker News” »
Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself – JISA Softech Pvt Ltd
The Digital Personal Data Protection (DPDP) Act, 2023 in India has been a pivot in the privacy debate moving it… The post Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Posted by Egidio Romano on Feb 04 ————————————————————————— Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability ————————————————————————— [-] Software Link: https://www.blesta.com [-] Affected Versions: All versions from 3.2.0 to 5.13.1. [-] Vulnerability Description: User input passed through the “confirm_url” GET parameter to the… – Read More – Full Disclosure
Posted by Egidio Romano on Feb 04 ——————————————————————————– Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities ——————————————————————————– [-] Software Link: https://www.blesta.com [-] Affected Versions: All versions from 3.0.0 to 5.13.1. [-] Vulnerabilities Description: The vulnerabilities exist because user input passed through the… – Read More – Full Disclosure
Posted by Egidio Romano on Feb 04 ————————————————————————– Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities ————————————————————————– [-] Software Link: https://www.blesta.com [-] Affected Versions: All versions from 3.0.0 to 5.13.1. [-] Vulnerabilities Description: The vulnerabilities exist because user input passed through the… – Read More – Full Disclosure
CyberDanube Security Research 20260119-0 | Authenticated Command Injection in Phoenix Contact TC Router Series – Full Disclosure
Posted by Thomas Weber | CyberDanube via Fulldisclosure on Feb 04 CyberDanube Security Research 20260119-0 ——————————————————————————- title| Authenticated Command Injection product| TC Router 5004T-5G EU vulnerable version| 1.06.18 fixed version| 1.06.23 CVE number| CVE-2025-41717 impact| High homepage| https://www.phoenixcontact.com/ found| 16.04.2025… – Read More – Full Disclosure
SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS) – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 04 SEC Consult Vulnerability Lab Security Advisory < 20260202-0 > ======================================================================= title: Multiple vulnerabilities product: Native Instruments – Native Access (MacOS) vulnerable version: verified up to 3.22.0 fixed version: n/a CVE number: CVE-2026-24070, CVE-2026-24071 impact: high homepage:… – Read … Read More “SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS) – Full Disclosure” »
Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about – especially when AI, LinkedIn, and a few biographical breadcrumbs do the heavy lifting. Sloppy redaction leads to explosive claims, and difficult reputational consequences for cybersecurity vendors, and we learn how trust – once cracked – can be almost impossible to fully … Read More “Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well – GRAHAM CLULEY” »
Red teaming has undergone a radical evolution. Modern organizations can no longer rely solely on human creativity or… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models – The Hacker News
Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant’s AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdoors … Read More “Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models – The Hacker News” »
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure – Read More –
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia, … Read More “China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns – The Hacker News” »
Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials – Hackread – Cybersecurity News, Data Breaches, AI and More
A new spy campaign by Mustang Panda uses fake US diplomatic briefings to target government officials. Discover how this silent surveillance operation works. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops – Read More –





