🛡️ Latest Cyber Security News

Step Finance says compromised execs' devices led to $40M crypto theft

BleepingComputer — Tue, 03 Feb 2026 16:33:23 -0500

Wave of Citrix NetScaler scans use thousands of residential proxies

BleepingComputer — Tue, 03 Feb 2026 15:25:40 -0500

CISA flags critical SolarWinds RCE flaw as exploited in attacks

BleepingComputer — Tue, 03 Feb 2026 14:37:00 -0500

Iron Mountain: Data breach mostly limited to marketing materials

BleepingComputer — Tue, 03 Feb 2026 11:49:09 -0500

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

The Hacker News — Tue, 03 Feb 2026 22:11:00 +0530

AI Agent Identity Management: A New Security Control Plane for CISOs

BleepingComputer — Tue, 03 Feb 2026 10:01:11 -0500

UK privacy watchdog probes Grok over AI-generated sexual images

BleepingComputer — Tue, 03 Feb 2026 09:25:50 -0500

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

The Hacker News — Tue, 03 Feb 2026 19:44:00 +0530

Hackers exploit critical React Native Metro bug to breach dev systems

BleepingComputer — Tue, 03 Feb 2026 09:00:00 -0500

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

The Hacker News — Tue, 03 Feb 2026 19:30:00 +0530

French prosecutors raid X offices, summon Musk over Grok deepfakes

BleepingComputer — Tue, 03 Feb 2026 07:43:37 -0500

When Cloud Outages Ripple Across the Internet

The Hacker News — Tue, 03 Feb 2026 16:30:00 +0530

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

The Hacker News — Tue, 03 Feb 2026 14:42:00 +0530

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

The Hacker News — Tue, 03 Feb 2026 11:09:00 +0530

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

The Hacker News — Tue, 03 Feb 2026 10:25:00 +0530

New GlassWorm attack targets macOS via compromised OpenVSX extensions

BleepingComputer — Mon, 02 Feb 2026 17:04:19 -0500

Russian hackers exploit recently patched Microsoft Office bug in attacks

BleepingComputer — Mon, 02 Feb 2026 16:00:07 -0500

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

The Hacker News — Mon, 02 Feb 2026 23:19:00 +0530

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

The Hacker News — Mon, 02 Feb 2026 21:58:00 +0530

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

NCSC Feed — Mon, 02 Feb 2026 16:24:04 GMT

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

The Hacker News — Mon, 02 Feb 2026 21:29:00 +0530

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

NCSC Feed — Thu, 29 Jan 2026 13:08:58 GMT

Designing safer links: secure connectivity for operational technology

NCSC Feed — Wed, 14 Jan 2026 10:36:19 GMT

The Government Cyber Action Plan: strengthening resilience across the UK

NCSC Feed — Wed, 07 Jan 2026 13:16:03 GMT

Home working: preparing your organisation and staff

NCSC Feed — Wed, 17 Dec 2025 15:44:47 GMT

Data breaches: guidance for individuals and families

NCSC Feed — Wed, 17 Dec 2025 15:16:01 GMT

Sextortion emails: how to protect yourself

NCSC Feed — Wed, 17 Dec 2025 14:57:16 GMT

Drawing good architecture diagrams

NCSC Feed — Tue, 16 Dec 2025 08:57:53 GMT

Mitigating malware and ransomware attacks

NCSC Feed — Mon, 15 Dec 2025 13:04:57 GMT

Cyber deception trials: what we’ve learned so far

NCSC Feed — Mon, 15 Dec 2025 08:17:28 GMT