πŸ›‘οΈ Latest Cyber Security News

Ransomware gang uses ISPsystem VMs for stealthy payload delivery

BleepingComputer β€” Thu, 05 Feb 2026 15:57:11 -0500

Microsoft to shut down Exchange Online EWS in April 2027

BleepingComputer β€” Thu, 05 Feb 2026 13:07:41 -0500

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

The Hacker News β€” Thu, 05 Feb 2026 22:55:00 +0530

Italian university La Sapienza goes offline after cyberattack

BleepingComputer β€” Thu, 05 Feb 2026 12:02:45 -0500

Romanian oil pipeline operator Conpet discloses cyberattack

BleepingComputer β€” Thu, 05 Feb 2026 10:15:49 -0500

When cloud logs fall short, the network tells the truth

BleepingComputer β€” Thu, 05 Feb 2026 10:00:10 -0500

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

The Hacker News β€” Thu, 05 Feb 2026 18:27:00 +0530

Newsletter platform Substack notifies users of data breach

BleepingComputer β€” Thu, 05 Feb 2026 07:54:48 -0500

The Buyer’s Guide to AI Usage Control

The Hacker News β€” Thu, 05 Feb 2026 17:00:00 +0530

Data breach at fintech firm Betterment exposes 1.4 million accounts

BleepingComputer β€” Thu, 05 Feb 2026 06:16:12 -0500

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

The Hacker News β€” Thu, 05 Feb 2026 15:55:00 +0530

Zendesk spam wave returns, floods users with 'Activate account' emails

BleepingComputer β€” Thu, 05 Feb 2026 05:22:36 -0500

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

The Hacker News β€” Thu, 05 Feb 2026 11:46:00 +0530

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

The Hacker News β€” Thu, 05 Feb 2026 10:26:00 +0530

Hackers compromise NGINX servers to redirect user traffic

BleepingComputer β€” Wed, 04 Feb 2026 18:26:56 -0500

Critical n8n flaws disclosed along with public exploits

BleepingComputer β€” Wed, 04 Feb 2026 16:14:36 -0500

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

The Hacker News β€” Wed, 04 Feb 2026 23:22:00 +0530

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

The Hacker News β€” Wed, 04 Feb 2026 22:54:00 +0530

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

The Hacker News β€” Wed, 04 Feb 2026 19:39:00 +0530

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

The Hacker News β€” Wed, 04 Feb 2026 17:28:00 +0530

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

NCSC Feed β€” Mon, 02 Feb 2026 16:24:04 GMT

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

NCSC Feed β€” Thu, 29 Jan 2026 13:08:58 GMT

Designing safer links: secure connectivity for operational technology

NCSC Feed β€” Wed, 14 Jan 2026 10:36:19 GMT

The Government Cyber Action Plan: strengthening resilience across the UK

NCSC Feed β€” Wed, 07 Jan 2026 13:16:03 GMT

Home working: preparing your organisation and staff

NCSC Feed β€” Wed, 17 Dec 2025 15:44:47 GMT

Data breaches: guidance for individuals and families

NCSC Feed β€” Wed, 17 Dec 2025 15:16:01 GMT

Sextortion emails: how to protect yourself

NCSC Feed β€” Wed, 17 Dec 2025 14:57:16 GMT

Drawing good architecture diagrams

NCSC Feed β€” Tue, 16 Dec 2025 08:57:53 GMT

Mitigating malware and ransomware attacks

NCSC Feed β€” Mon, 15 Dec 2025 13:04:57 GMT

Cyber deception trials: what we’ve learned so far

NCSC Feed β€” Mon, 15 Dec 2025 08:17:28 GMT