🛡️ Latest Cyber Security News

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

The Hacker News — Wed, 04 Feb 2026 23:22:00 +0530

CISA: VMware ESXi flaw now exploited in ransomware attacks

BleepingComputer — Wed, 04 Feb 2026 12:38:46 -0500

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

The Hacker News — Wed, 04 Feb 2026 22:54:00 +0530

CISA warns of five-year-old GitLab flaw exploited in attacks

BleepingComputer — Wed, 04 Feb 2026 10:42:31 -0500

The Double-Edged Sword of Non-Human Identities

BleepingComputer — Wed, 04 Feb 2026 10:05:15 -0500

EDR killer tool uses signed kernel driver from forensic software

BleepingComputer — Wed, 04 Feb 2026 09:17:45 -0500

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

The Hacker News — Wed, 04 Feb 2026 19:39:00 +0530

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

BleepingComputer — Wed, 04 Feb 2026 09:00:00 -0500

Microsoft rolls out native Sysmon monitoring in Windows 11

BleepingComputer — Wed, 04 Feb 2026 07:58:20 -0500

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

The Hacker News — Wed, 04 Feb 2026 17:28:00 +0530

Owner of Incognito dark web drugs market gets 30 years in prison

BleepingComputer — Wed, 04 Feb 2026 06:24:23 -0500

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

The Hacker News — Wed, 04 Feb 2026 15:30:00 +0530

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

The Hacker News — Wed, 04 Feb 2026 13:12:00 +0530

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Hacker News — Wed, 04 Feb 2026 11:56:00 +0530

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

The Hacker News — Wed, 04 Feb 2026 11:20:00 +0530

Coinbase confirms insider breach linked to leaked support tool screenshots

BleepingComputer — Tue, 03 Feb 2026 21:04:23 -0500

Step Finance says compromised execs' devices led to $40M crypto theft

BleepingComputer — Tue, 03 Feb 2026 16:33:23 -0500

Wave of Citrix NetScaler scans use thousands of residential proxies

BleepingComputer — Tue, 03 Feb 2026 15:25:40 -0500

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

The Hacker News — Tue, 03 Feb 2026 22:11:00 +0530

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

The Hacker News — Tue, 03 Feb 2026 19:44:00 +0530

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

NCSC Feed — Mon, 02 Feb 2026 16:24:04 GMT

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

NCSC Feed — Thu, 29 Jan 2026 13:08:58 GMT

Designing safer links: secure connectivity for operational technology

NCSC Feed — Wed, 14 Jan 2026 10:36:19 GMT

The Government Cyber Action Plan: strengthening resilience across the UK

NCSC Feed — Wed, 07 Jan 2026 13:16:03 GMT

Home working: preparing your organisation and staff

NCSC Feed — Wed, 17 Dec 2025 15:44:47 GMT

Data breaches: guidance for individuals and families

NCSC Feed — Wed, 17 Dec 2025 15:16:01 GMT

Sextortion emails: how to protect yourself

NCSC Feed — Wed, 17 Dec 2025 14:57:16 GMT

Drawing good architecture diagrams

NCSC Feed — Tue, 16 Dec 2025 08:57:53 GMT

Mitigating malware and ransomware attacks

NCSC Feed — Mon, 15 Dec 2025 13:04:57 GMT

Cyber deception trials: what we’ve learned so far

NCSC Feed — Mon, 15 Dec 2025 08:17:28 GMT