
- OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skillsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 8, 2026 at 7:32 am
OpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, […]
- German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalistsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 7, 2026 at 11:15 am
Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint […]
- China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Deliveryby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 2:56 pm
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors […]
- CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Riskby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 1:43 pm
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge […]
- Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entitiesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 12:07 pm
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries […]
- How Samsung Knox Helps Stop Your Network Security Breachby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 10:30 am
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, […]
- Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 8:40 am
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to […]
- Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Librariesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 6, 2026 at 5:49 am
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity […]
- AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 5:25 pm
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted […]
- ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 12:57 pm
This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that […]
- The Buyer’s Guide to AI Usage Controlby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 11:30 am
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding […]
- Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Endsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 10:25 am
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control […]
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflowsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 6:16 am
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary […]
- Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaignby info@thehackernews.com (The Hacker News) (The Hacker News) on February 5, 2026 at 4:56 am
Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an […]
- Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Modelsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 5:52 pm
Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in […]
- DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Filesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 5:24 pm
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate system […]
- China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaignsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 2:09 pm
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia […]
- Orchid Security Introduces Continuous Identity Observability for Enterprise Applicationsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 11:58 am
An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity […]
- The First 90 Seconds: How Early Decisions Shape Incident Response Investigationsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 10:00 am
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is […]
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installersby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 7:42 am
Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python […]
- Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensionsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 6:26 am
The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are […]
- CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalogby info@thehackernews.com (The Hacker News) (The Hacker News) on February 4, 2026 at 5:50 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited […]
- Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadataby info@thehackernews.com (The Hacker News) (The Hacker News) on February 3, 2026 at 4:41 pm
Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the […]
- [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automateby info@thehackernews.com (The Hacker News) (The Hacker News) on February 3, 2026 at 2:14 pm
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered […]
- Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Packageby info@thehackernews.com (The Hacker News) (The Hacker News) on February 3, 2026 at 2:00 pm
Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package. Cybersecurity […]
