Cybercriminals are increasingly turning trusted software against defenders, according to new research from Huntress, which has uncovered a real-world attack in which threat actors used a legitimate but vulnerable driver to disable endpoint security tools before deploying further malicious activity.…
Proton Warns European Startups: No One Is Too Small to Be Targeted by Hackers
Swiss privacy company Proton is urging European startups to rethink their cybersecurity approach after new research based on dark-web breach monitoring found that early-stage companies are increasingly targeted by cybercriminals, with significant consequences for innovation, data protection, and business continuity.…
Harlan Parrott Appointed as KnowBe4’s VP of AI Innovation
KnowBe4 has announced the appointment of Harlan Parrott as VP of AI Innovation, following the company’s 10-year anniversary celebration of pioneering Artificial Intelligence (AI) in cybersecurity. As VP, Parrott will lead the AI Center of Excellence by overseeing the company’s…
Orchid Security Adds Ability to Audit Behaviors by Identity
Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data…
Experts Find Malicious Browser Extensions, Chrome, Safari, and Edge Affected
Threat actors exploit extensions Cybersecurity experts found 17 extensions for Chrome, Edge, and Firefox browsers which track user’s internet activity and install backdoors for access. The extensions were downloaded over 840,000 times. The campaign is not new. LayerX claimed that…
China-Linked Hackers Step Up Quiet Spying Across South-East Asia
Threat actors linked to China have been blamed for a new wave of cyber-espionage campaigns targeting government and law-enforcement agencies across South-East Asia during 2025, according several media reports. Researchers at Check Point Research said they are tracking a previously…
Smart Homes Under Threat: How to Reduce the Risk of IoT Device Hacking
Most households today use some form of internet of things (IoT) technology, whether it’s a smartphone, tablet, smart plugs, or a network of cameras and sensors. Learning that nearly 120,000 home security cameras were compromised in South Korea and…
Tactical Wireless Security
A hands-on guide to testing wireless defenses, mastering SDR, and understanding modern RF attack techniques. This article has been indexed from CyberMaterial Read the original article: Tactical Wireless Security
IT Security News Hourly Summary 2026-02-05 18h : 7 posts
7 posts were published in the last hour 16:36 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 26, 2026 to February 1, 2026) 16:36 : Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics 16:35 : 170+…
Wordfence Intelligence Weekly WordPress Vulnerability Report (January 26, 2026 to February 1, 2026)
📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnerability, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find…
Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics
Italy stopped Russian-linked cyberattacks targeting Foreign Ministry offices and Winter Olympics websites and hotels, Foreign Minister Tajani said. Italy has thwarted a series of Russian-linked cyberattacks aimed at Foreign Ministry offices, including one in Washington, as well as Winter Olympics…
170+ SolarWinds Help Desk Installations Vulnerable to RCE Attacks Exposed Online
Over 170 SolarWinds Web Help Desk installations remain vulnerable to a critical remote code execution (RCE) flaw that has been actively exploited in the wild and recently added to CISA’s Known Exploited Vulnerabilities catalog. The vulnerability, tracked as CVE-2025-40551, carries…
Attackers Mimic RTO Challan Notifications to Deliver Android Malware
A sophisticated Android malware campaign targeting Indian users has emerged, disguising itself as legitimate Regional Transport Office (RTO) challan notifications. The malicious applications are distributed outside the Google Play Store, primarily through WhatsApp and similar messaging platforms, exploiting user trust…
Betterment Data Breach Exposes 1.4 million Customers Personal Details
Betterment has disclosed a social engineering–driven data breach that exposed personal information for approximately 1.4 million customer accounts, significantly expanding the fallout from a January 2026 security incident tied to fraudulent crypto scam messages. In early January 2026, Betterment, a…
Betterment breach may expose 1.4M users after social engineering attack
Breach-tracking site flags dataset following impersonation-based intrusion Breach-tracking site Have I Been Pwned (HIBP) claims a cyberattack on Betterment affected roughly 1.4 million users – although the investment company has yet to publicly confirm how many customers were affected by…
CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
CVE-2025-22225, a VMware ESXi arbitrary write vulnerability, is being used in ransomware campaigns, CISA confirmed on Wednesday by updating the vulnerability’s entry in its Known Exploited Vulnerabilities (KEV) catalog. Researchers linked VMware ESXi zero-day trio to single exploit toolkit Broadcom…
Data breach at govtech giant Conduent balloons, affecting millions more Americans
The ransomware attack at Conduent allowed hackers to steal a “significant number of individuals’ personal information” from the govtech giant’s systems. Conduent handles personal and health data of more than 100 million people across America. This article has been indexed…
Substack Discloses Security Incident After Hacker Leaks Data
The hacker claims to have stolen nearly 700,000 Substack user records, including email addresses and phone numbers. The post Substack Discloses Security Incident After Hacker Leaks Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Microsoft Unveils Backdoor Scanner for Open-Weight AI Models
Microsoft has introduced a new lightweight scanner designed to detect hidden backdoors in open‑weight large language models (LLMs), aiming to boost trust in artificial intelligence systems. The tool, built by the company’s AI Security team, focuses on subtle behavioral…
Makina Finance Loses $4M in ETH After Flash Loan Price Manipulation Exploit
One moment it was operating normally – then suddenly, price feeds went haywire. About 1,299 ETH vanished during what looked like routine activity. That sum now exceeds four million dollars in value. The trigger? A flash loan attack targeting…
OpenAI Frontier organizes AI agents under one system
OpenAI introduced Frontier, a platform designed to organize AI agents that perform business tasks within internal systems and workflows. The platform connects data from multiple internal systems including customer relationship management tools, ticketing platforms, and data warehouses. This integration creates…
Cyber Briefing: 2026.02.05
Zendesk abuse fuels spam, SolarWinds RCE exploited, AI and finance breaches mount, lawmakers target scam ads, and insider threats intensify. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.02.05
Common Crypto Scams and How to Protect Your Funds in 2026
Crypto scams are surging worldwide, from pig butchering to fake trading platforms and deepfakes, draining victims while fraud teams struggle to keep up. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the…
Godent Rolls Out Scanner-as-a-Service Model to Drive Digital Transformation in European Dentistry
Godent has announced the launch of its scanner-as-a-service program for European DSOs, combining free intraoral scanners with a fully integrated digital lab infrastructure to modernize dental workflows. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI…