Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate…
Nation-State Actors Exploit Notepad++ Supply Chain
Unit 42 reveals new infrastructure associated with the Notepad++ attack. This expands understanding of threat actor operations and malware delivery. The post Nation-State Actors Exploit Notepad++ Supply Chain appeared first on Unit 42. This article has been indexed from Unit…
VoidLink Framework Enables On-Demand Tool Generation with Windows Plugin Support
A newly tracked intrusion framework called VoidLink is drawing attention for its modular design and focus on Linux systems. It behaves like an implant management framework, letting operators deploy a core implant and add capabilities as needed, which shortens the…
Hackers Use LLM to Create React2Shell Malware, the Latest Example of AI-Generated Threat
Darktrace researchers caught a sample of malware that was created by AI and LLMs to exploit the high-profiled React2Shell vulnerability, putting defenders on notice that the technology lets even lesser-skilled hackers create malicious code and build complex exploit frameworks. The…
IT Security News Hourly Summary 2026-02-12 00h : 2 posts
2 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-02-11 22:24 : Microsoft Patches Windows Flaw Causing VPN Disruptions
IT Security News Daily Summary 2026-02-11
169 posts were published in the last hour 22:24 : Microsoft Patches Windows Flaw Causing VPN Disruptions 21:32 : ICE Is Crashing the US Court System in Minnesota 21:32 : Devilish devs spawn 287 Chrome extensions to flog your browser…
Microsoft Patches Windows Flaw Causing VPN Disruptions
Microsoft patches CVE-2026-21525, an actively exploited RasMan flaw that can crash Windows VPN services and disrupt remote access. The post Microsoft Patches Windows Flaw Causing VPN Disruptions appeared first on TechRepublic. This article has been indexed from Security Archives –…
ICE Is Crashing the US Court System in Minnesota
Petitions demanding people get the chance to be released from ICE custody have overwhelmed courts throughout the US. This article has been indexed from Security Latest Read the original article: ICE Is Crashing the US Court System in Minnesota
Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers
Add-ons with 37M installs leak visited URLs to 30+ recipients, researcher says They know where you’ve been and they’re going to share it. A security researcher has identified 287 Chrome extensions that allegedly exfiltrate browsing history data for an estimated…
How to Prevent Vishing Attacks Targeting Okta and other IDPs
Vishing as the Front Door to MFA Bypass Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems. Rather than relying solely on email-based phishing, attackers…
Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users
Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim’s computer by clicking a malicious link or opening a file. Patch now. This article has been indexed from Security News | TechCrunch Read…
NDSS 2025 – Detecting And Explaining Malware Promotion Via App Promotion Graph
Session 12B: Malware Authors, Creators & Presenters: Shang Ma (University of Notre Dame), Chaoran Chen (University of Notre Dame), Shao Yang (Case Western Reserve University), Shifu Hou (University of Notre Dame), Toby Jia-Jun Li (University of Notre Dame), Xusheng Xiao…
AWS penetration testing: Definition, Policy Tools, and process
Amazon Web Services (AWS) is a cloud-computing platform offered by Amazon, which provides cloud services such as computing power, storage, databases, networking, and automated intelligence. AWS replaces data centres, builds applications, and offers pay-as-you-go. The unique features of AWS are…
Survey: Widespread Adoption of AI Hasn’t Yet Reduced Cybersecurity Burnout
A global survey of 1,813 IT and cybersecurity professionals finds that despite the rise of artificial intelligence (AI) and automation, cybersecurity teams still spend on average 44% of their time on manual or repetitive work. Conducted by Sapio Research on…
Volvo Group hit in massive Conduent data breach
A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the total impact rises to 25 million people. A data breach at business services provider Conduent has impacted at least 25 million people, far more than…
Massive Spike in Attacks Exploiting Ivanti EPMM Systems 0-day Vulnerability
An unprecedented surge in exploitation attempts targeting CVE-2026-1281, a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). On February 9, 2026, Shadowserver scans revealed over 28,300 unique source IP addresses attempting to exploit the flaw, marking one of the largest…
RU-APT-ChainReaver-L Hijacks Trusted Websites and GitHub Repos in Massive Cross-Platform Supply Chain Campaign
A sophisticated cyber threat has emerged, targeting users across multiple operating systems through compromised mirror websites and GitHub repositories. The RU-APT-ChainReaver-L campaign represents one of the most elaborate supply chain attacks identified recently, affecting Windows, macOS, and iOS platforms simultaneously.…
GTIG Analysis Highlights Escalating Espionage and Supply Chain Risks Facing Defense Sector
Modern warfare extends far beyond physical battlefields, increasingly infiltrating the digital servers and supply chains that safeguard national defense. Today, the sector faces a relentless barrage of cyber operations from state-sponsored actors and criminal groups alike. These attacks no longer…
Apple Patches Everything: February 2026, (Wed, Feb 11th)
Today, Apple released updates for all of its operating systems (iOS, iPadOS, macOS, tvOS, watchOS, and visionOS). The update fixes 71 distinct vulnerabilities, many of which affect multiple operating systems. Older versions of iOS, iPadOS, and macOS are also updated. …
Observing the Anatomy of Peak Traffic
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Observing the Anatomy of Peak Traffic
CISA’s 2025 Year in Review: Driving Security and Resilience Across Critical Infrastructure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA News Read the original article: CISA’s 2025 Year in Review: Driving Security and Resilience Across Critical…
CVE-2026-25646: Legacy Libpng Flaw Poses RCE Risk
A decades-old libpng flaw exposes widely used systems to denial-of-service and potential code execution via crafted PNG files. The post CVE-2026-25646: Legacy Libpng Flaw Poses RCE Risk appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack
Officials said data will now be classified as one of four categories: “public,” “sensitive,” “confidential” or “restricted.” The post Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
IT Security News Hourly Summary 2026-02-11 21h : 6 posts
6 posts were published in the last hour 19:34 : Randall Munroe’s XKCD ’16 Part Epoxy’ 19:29 : 8 contact center challenges and how to address them 19:29 : DOJ says Trenchant boss sold exploits to Russian broker capable of…