CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:15 06/02/2026 UTC
  • Qilin ransomware group targets multiple organizations, including South Korean financial sector and Romanian oil pipeline operator Conpet The Qilin ransomware group has been active, targeting multiple organizations, including Inotiv, a U.S.-based pharmaceutical company, Creative Box Inc. (CBI), a subsidiary of Nissan, Mecklenburg County Public Schools (MCPS), Asahi Group, Synnovis, a UK pathology services provider, and Conpet, Romania's national oil pipeline operator. The latest attack was on Conpet, where Qilin claims to have stolen nearly 1TB of documents and leaked over a dozen photos of internal documents containing financial information and passport scans as proof of the breach. The attack caused significant operational disruption, including the temporary takedown of the company's website. The group has also targeted other Japanese companies, including Shinko Plastics and Osaki Medical. The Qilin ransomware group operates as a ransomware-as-a-service (RaaS) network, providing tools and infrastructure to affiliates and taking a 15–20% share of ransom payments. The group's malware is custom-built in Rust and C for cross-platform attacks, including Windows, Linux, and ESXi systems. The Qilin ransomware operation was first launched as "Agenda" in August 2022 and rebranded to Qilin by September 2022. Qilin ransomware operation has attacked more than 700 victims across 62 countries in 2025. The Qilin ransomware operation has published over 40 new victims per month in the second half of 2025. The Qilin ransomware operation uses the Windows Subsystem for Linux (WSL) to execute Linux encryptors on Windows systems, evading traditional security tools. Qilin ransomware group has been observed exploiting unpatched VPN appliances and lack of multi-factor authentication (MFA) to gain initial access to corporate networks. Qilin ransomware group has been observed targeting small-to-medium-sized businesses in the construction, healthcare, and financial sectors. Qilin ransomware group has been observed using new extortion channels, including Telegram and public sites such as WikiLeaksV2. Qilin ransomware group has been observed collaborating with affiliates of the Scattered Spider group. Qilin ransomware group has been observed operating as a ransomware-as-a-service (RaaS) group since 2023, leasing its tools and infrastructure to affiliates. Qilin ransomware group has been observed publishing victims' data on dark-web leak sites if no ransom is paid. Asahi Group Holdings confirmed that the personal data of approximately 1.914 million individuals, including 1.525 million customers, was or may have been exposed in the cyber-attack. The exposed data includes names, genders, dates of birth, postal addresses, email addresses, and phone numbers. Asahi Group Holdings spent two months investigating the breach, conducting root cause analysis, integrity checks, containing the ransomware, restoring systems, and strengthening security. Atsushi Katsuki, President and Group CEO of Asahi Group Holdings, publicly apologized for the difficulties caused by the disruptions. Asahi Group Holdings is reviewing the potential impact of the incident on its financial results for fiscal year 2025. The Qilin ransomware group claimed responsibility for the cyber-attack on Asahi Group Holdings. Asahi Group Holdings temporarily suspended its operations in Japan in late September following a system failure due to the ransomware attack. The disruptions included order and shipment operations, call centers, and customer service desks. Asahi Group Holdings postponed the launch of a new product scheduled to be released in October due to the cyber-attack. On October 7, the Qilin ransomware group listed Asahi on its data leak site, claiming to have stolen 27 GB of files from the company. Inotiv is notifying 9,542 individuals that their personal information was stolen in the August 2025 ransomware attack. Inotiv has restored availability and access to impacted networks and systems affected by the August 2025 ransomware attack. The Qilin ransomware group claimed responsibility for the breach in August 2025, leaked data samples, and said they exfiltrated over 162,000 files totaling 176 GB from Inotiv. Asahi Group Holdings is considering the creation of a dedicated cybersecurity unit within the group. Asahi Group Holdings is scrapping the use of virtual private networks (VPNs) and is adopting a stricter zero-trust model. Asahi Group Holdings has postponed the disclosure of sales performance for its operating due to the ongoing effects of the cyber-attack on its systems. Asahi Group Holdings recorded a 20% year-on-year drop in alcohol sales in Japan in November 2025 due to the cyber-attack. Asahi Group Holdings has refrained from releasing monthly sales data by category and brand due to the ongoing effects of the cyber-attack on its systems. November marks the third consecutive month Asahi Group Holdings has skipped disclosures of sales data, citing difficulties in accurately compiling the figures. Read
  • Multiple Critical n8n Workflow Automation Vulnerabilities (CVE-2025-68613, CVE-2025-68668, CVE-2026-21877, CVE-2026-21858) Multiple critical vulnerabilities in the n8n workflow automation platform continue to pose severe risks, with the latest flaw, CVE-2026-25049 (CVSS 9.4), enabling authenticated users to execute arbitrary system commands via malicious workflows. This vulnerability bypasses earlier patches for CVE-2025-68613 and stems from inadequate sanitization in n8n’s expression evaluation, allowing attackers to exploit TypeScript’s compile-time type system mismatches with JavaScript’s runtime behavior. Successful exploitation can lead to server compromise, credential theft, and persistent backdoor installation, with heightened risk when paired with n8n’s public webhook feature. The vulnerabilities collectively affect over 105,000 exposed instances, primarily in the U.S. and Europe, and impact both self-hosted and cloud deployments. Earlier flaws—including CVE-2026-21877 (CVSS 10.0), CVE-2026-21858 (CVSS 10.0), and sandbox escape vulnerabilities CVE-2026-1470 (CVSS 9.9) and CVE-2026-0863 (CVSS 8.5)—have already demonstrated the potential for full server takeover, AI workflow hijacking, and exposure of sensitive credentials (API keys, OAuth tokens, database passwords). Patches are available in versions 1.123.17, 2.4.5, 2.5.1, and 2.5.2, but unpatched systems remain at critical risk. Users are urged to upgrade immediately, restrict workflow permissions, and harden deployment environments to mitigate exposure. Read
  • Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure The Aisuru/Kimwolf botnet ecosystem has escalated its global threat, now conducting record-breaking DDoS campaigns—including a 31.4 Tbps attack in November 2025 and a holiday-themed "The Night Before Christmas" campaign (December 19, 2025) with peaks of 24 Tbps, 9 Bpps, and 205 Mrps. This follows the 29.7 Tbps assault in Q3 2025 and disruption of the IPIDEA proxy network (January 2026), which had enabled the botnets’ lateral movement into government, healthcare, and critical infrastructure networks via 33,000+ compromised endpoints in universities and 8,000 in U.S./foreign government systems. With over 6 million infected devices (1–4M IoT for Aisuru; >2M Android TVs/boxes for Kimwolf), the botnets now blend hyper-volumetric DDoS with residential proxy monetization, targeting sectors beyond gaming to include telecom, IT, finance, and AI companies. Cloudflare reported 47.1 million DDoS attacks mitigated in 2025 (100% YoY increase), with hyper-volumetric incidents surging 40% QoQ in Q4—highlighting the botnets’ rapid evolution in scale, sophistication, and cross-sector impact. Despite Google’s January 2026 takedown of IPIDEA (reducing proxy devices by millions), persistent infections and new attack vectors (e.g., trojanized apps, ENS-based C2) underscore the ongoing systemic risk to global internet stability and enterprise security. Read
  • Zendesk Platform Abused for Email Flood Attacks Cybercriminals have exploited lax authentication settings in Zendesk to flood targeted email inboxes with spam messages. The attacks use hundreds of Zendesk corporate customers simultaneously, sending notifications from customer domain names. Zendesk acknowledged the issue and is investigating additional preventive measures. The abuse involves sending ticket creation notifications from customer accounts that allow anonymous submissions. This allows attackers to create support tickets with any chosen subject line, including menacing or insulting messages. The notifications appear to come from legitimate customer domains, making them harder to filter out. The spam wave started on January 18th, 2026, with victims reporting receiving hundreds of emails. Companies impacted include Discord, Tinder, Riot Games, Dropbox, CD Projekt (2k.com), Maya Mobile, NordVPN, Tennessee Department of Labor, Tennessee Department of Revenue, Lightspeed, CTL, Kahoot, Headspace, and Lime. Zendesk has introduced new safety features to detect and stop this type of spam in the future. A fresh wave of spam hit inboxes worldwide on February 4th, 2026, with users reporting being bombarded by automated emails generated through companies' unsecured Zendesk support systems. The emails had subject lines such as 'Activate your account' and similar support-style notifications appearing to originate from different companies. Read
  • Substack Data Breach Exposes User Email Addresses and Phone Numbers Substack has confirmed a data breach that occurred in October 2025, during which attackers stole email addresses and phone numbers. The breach was detected on February 3, 2026, and confirmed via an email notification to users on February 5, 2026. Substack assured users that no credentials or financial information were accessed. A threat actor later leaked a database containing 697,313 records on BreachForums, claiming the data was scraped. Substack has patched the vulnerability and warned users about potential phishing attempts. Substack has a history of privacy incidents, including a 2020 email exposure. The platform has grown significantly since its launch in 2017, reaching over 50 million active subscriptions, including five million paid, by March 2025. Read
  • EFF Launches 'Encrypt It Already' Campaign for Big Tech E2EE Adoption The Electronic Frontier Foundation (EFF) has launched the 'Encrypt It Already' campaign urging major technology and communications companies to prioritize end-to-end encryption (E2EE) for user data and communications. The initiative focuses on three key areas: releasing promised E2EE features, enabling them by default, and launching data protection capabilities already available from competitors. The campaign highlights companies like Bluesky, Ring, and Google for their delayed or optional E2EE implementations. The EFF emphasizes the importance of E2EE in protecting user privacy from third-party access, including law enforcement and government agencies. The campaign also addresses the growing privacy concerns exacerbated by the rise of artificial intelligence (AI) and its potential for misuse. The EFF aims to hold companies accountable for their privacy promises and empower users to control their data. Read
  • DragonForce Cartel Ransomware Emerges with Conti-Derived Encryption DragonForce, a Conti-derived ransomware operation, has evolved into a cartel-like structure, recruiting affiliates and partnering with Scattered Spider for sophisticated attacks. The group exploits vulnerable drivers to deactivate security programs and has intensified its operations, publishing details of more compromised entities. DragonForce offers affiliates 80% of profits, customizable encryptors, and infrastructure, lowering the barrier to entry for new cybercriminals. The group's partnership with Scattered Spider has enabled high-profile breaches, including the Marks & Spencer incident. DragonForce has also proposed cooperation among major ransomware operations to stabilize the market and increase collective profits. Security experts advise robust backup practices, network segmentation, and consistent patching to defend against such threats. Read
Last updated: 18:00 06/02/2026 UTC
  • Multiple Critical n8n Workflow Automation Vulnerabilities (CVE-2025-68613, CVE-2025-68668, CVE-2026-21877, CVE-2026-21858) Multiple critical vulnerabilities in the n8n workflow automation platform continue to pose severe risks, with the latest flaw, CVE-2026-25049 (CVSS 9.4), enabling authenticated users to execute arbitrary system commands via malicious workflows. This vulnerability bypasses earlier patches for CVE-2025-68613 and stems from inadequate sanitization in n8n’s expression evaluation, allowing attackers to exploit TypeScript’s compile-time type system mismatches with JavaScript’s runtime behavior. Successful exploitation can lead to server compromise, credential theft, and persistent backdoor installation, with heightened risk when paired with n8n’s public webhook feature. The vulnerabilities collectively affect over 105,000 exposed instances, primarily in the U.S. and Europe, and impact both self-hosted and cloud deployments. Earlier flaws—including CVE-2026-21877 (CVSS 10.0), CVE-2026-21858 (CVSS 10.0), and sandbox escape vulnerabilities CVE-2026-1470 (CVSS 9.9) and CVE-2026-0863 (CVSS 8.5)—have already demonstrated the potential for full server takeover, AI workflow hijacking, and exposure of sensitive credentials (API keys, OAuth tokens, database passwords). Patches are available in versions 1.123.17, 2.4.5, 2.5.1, and 2.5.2, but unpatched systems remain at critical risk. Users are urged to upgrade immediately, restrict workflow permissions, and harden deployment environments to mitigate exposure. Read
  • GlassWorm malware targets OpenVSX, VS Code registries The GlassWorm malware campaign has resurfaced with a third wave, adding 24 new packages to OpenVSX and Microsoft Visual Studio Marketplace. The malware uses invisible Unicode characters to hide malicious code and targets GitHub, NPM, and OpenVSX account credentials, as well as cryptocurrency wallet data. The campaign initially impacted 49 extensions, with an estimated 35,800 downloads, though this figure includes inflated numbers due to bots and visibility-boosting tactics. The Eclipse Foundation has revoked leaked tokens and introduced security measures, but the threat actors have pivoted to GitHub and now returned to OpenVSX with updated command-and-control endpoints. The malware's global reach includes systems in the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security has accessed the attackers' server and shared victim data with law enforcement. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The third wave of Glassworm uses Rust-based implants packaged inside the extensions and targets popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. Read
  • Zendesk Platform Abused for Email Flood Attacks Cybercriminals have exploited lax authentication settings in Zendesk to flood targeted email inboxes with spam messages. The attacks use hundreds of Zendesk corporate customers simultaneously, sending notifications from customer domain names. Zendesk acknowledged the issue and is investigating additional preventive measures. The abuse involves sending ticket creation notifications from customer accounts that allow anonymous submissions. This allows attackers to create support tickets with any chosen subject line, including menacing or insulting messages. The notifications appear to come from legitimate customer domains, making them harder to filter out. The spam wave started on January 18th, 2026, with victims reporting receiving hundreds of emails. Companies impacted include Discord, Tinder, Riot Games, Dropbox, CD Projekt (2k.com), Maya Mobile, NordVPN, Tennessee Department of Labor, Tennessee Department of Revenue, Lightspeed, CTL, Kahoot, Headspace, and Lime. Zendesk has introduced new safety features to detect and stop this type of spam in the future. A fresh wave of spam hit inboxes worldwide on February 4th, 2026, with users reporting being bombarded by automated emails generated through companies' unsecured Zendesk support systems. The emails had subject lines such as 'Activate your account' and similar support-style notifications appearing to originate from different companies. Read
  • Windows 11 23H2 Shutdown Issue with System Guard Secure Launch Windows 11 23H2 devices with System Guard Secure Launch enabled fail to shut down properly after installing the January 13, 2026, cumulative update (KB5073455). Affected systems restart instead of shutting down or entering hibernation. This issue impacts Enterprise and IoT editions of Windows 11, version 23H2, as well as Windows 10 22H2, Windows 10 Enterprise LTSC 2021, and Windows 10 Enterprise LTSC 2019 with Virtual Secure Mode (VSM) enabled. Microsoft has provided a temporary workaround for shutdown but no solution for hibernation. The company is also addressing a separate bug in the January 2026 KB5074109 update causing Remote Desktop connection failures. Microsoft has released an out-of-band update (KB5077797) to fix the shutdown issue in Windows 11 23H2. Read
  • Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed Under Armour is investigating a data breach after 72 million customer records were allegedly exposed online by the Everest ransomware group. The breach reportedly occurred in November 2025, with data including email addresses, personal information, and purchase details being published on a hacking forum in January 2026. Under Armour has confirmed the investigation and stated that there is no evidence the breach affected payment systems or customer passwords. Additionally, Iron Mountain, a data storage and recovery services company, reported a breach by the Everest group, which was limited to marketing materials and did not involve customer confidential or sensitive information. Read
  • ShinyHunters and Scattered Spider Collaboration The ShinyHunters and Scattered Spider collaboration, operating under the Scattered Lapsus$ Shiny Hunters (SLSH) alliance, has escalated its extortion tactics in early 2026, combining technical intrusions with psychological harassment, swatting, and media manipulation to coerce payments. A February 2026 analysis by Allison Nixon (Unit 221B) reveals the group’s unreliable and fractious nature, rooted in its origins within The Com—a decentralized cybercriminal network prone to internal betrayals and operational instability. Unlike traditional ransomware groups, SLSH does not guarantee data deletion post-payment, instead using extortion as a pretext for future fraud while deploying DDoS attacks, email floods, and threats of physical violence against executives, their families, and even security researchers. This follows a year of high-impact breaches, including the $107 million loss at the Co-operative Group (U.K.), Jaguar Land Rover’s operational shutdown, and attacks on Allianz Life, Farmers Insurance, and PornHub Premium members via the Mixpanel analytics breach. The groups leverage vishing, OAuth token abuse, and AI-enhanced tooling to exploit SaaS platforms (Okta, SharePoint, Salesforce), while law enforcement arrests (e.g., Owen Flowers, Thalha Jubair) and shutdown claims have failed to halt operations. The FBI, U.K. NCA, and Google Threat Intelligence continue tracking their adaptive tactics, now compounded by SLSH’s use of harassment as a core extortion lever, rendering traditional negotiation strategies ineffective. Victims are advised to refuse engagement beyond a firm "no payment" stance, as compliance only fuels further escalation. The alliance’s latest developments—including the ShinySp1d3r RaaS platform, Zendesk phishing campaigns, and targeted intrusions against financial sectors—demonstrate a multi-pronged expansion in both technical sophistication and psychological warfare, solidifying their status as a high-risk, low-trust threat actor in the cybercrime landscape. Read
  • React Native CLI Remote Code Execution Vulnerability (CVE-2025-11953) A critical security flaw in the React Native CLI package, tracked as CVE-2025-11953, allowed remote, unauthenticated attackers to execute arbitrary OS commands on development servers. The vulnerability affected versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package, impacting millions of developers using the React Native framework. The flaw was patched in version 20.0.0. The vulnerability is being actively exploited in the wild, with attacks observed on December 21, 2025, January 4, 2026, and January 21, 2026. The attacks involve delivering base-64 encoded PowerShell payloads hidden in the HTTP POST body of malicious requests. The payloads disable endpoint protections, establish a raw TCP connection to attacker-controlled infrastructure, write data to disk, and execute the downloaded binary. Approximately 3,500 exposed React Native Metro servers are still online, according to scans using the ZoomEye search engine. Despite active exploitation being observed for over a month, the vulnerability still carries a low score in the Exploit Prediction Scoring System (EPSS). The vulnerability affects Windows, Linux, and macOS systems, with varying levels of control over executed commands. The flaw was discovered by researchers at JFrog and disclosed in early November 2025. The vulnerability is dubbed Metro4Shell by VulnCheck. The Windows payload is a Rust-based UPX-packed binary with basic anti-analysis logic, and the same attacker infrastructure hosts corresponding Linux binaries, indicating cross-platform targeting. Read

Latest updates

Browse →

Active Spyware Campaigns Targeting High-Value Signal and WhatsApp Users

Updated: 06.02.2026 22:00 · First: 25.11.2025 08:42 · 📰 3 src / 6 articles

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert warning of active spyware campaigns targeting high-value Signal and WhatsApp users. These campaigns leverage sophisticated social engineering and zero-click exploits to compromise mobile devices and exfiltrate sensitive data. The targets include government officials, military personnel, political figures, and civil society organizations across the U.S., Middle East, and Europe. A new campaign, dubbed GhostPairing, abuses the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes. This campaign was first spotted in Czechia but has the potential to spread to other regions. The attack involves tricking victims into linking an attacker's browser to their WhatsApp device, granting the attacker full access to the account without requiring any authentication. Germany's domestic intelligence agency has also warned of state-sponsored threat actors targeting high-ranking individuals via messaging apps like Signal. These attacks combine social engineering with legitimate features to steal data from politicians, military officers, diplomats, and investigative journalists in Germany and across Europe. The attacks involve impersonating Signal's support service and tricking targets into sharing their Signal PIN or an SMS verification code, leading to account hijacking. The second attack variant involves convincing the target to scan a QR code, abusing Signal’s legitimate linked-device feature to pair the account with the attacker’s device.

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking and Malware Delivery

Updated: 06.02.2026 20:35 · First: 06.02.2026 16:56 · 📰 3 src / 5 articles

Cybersecurity researchers have uncovered a China-linked adversary-in-the-middle (AitM) framework called DKnife, active since at least 2019. The framework targets routers and edge devices to perform deep packet inspection, manipulate traffic, and deliver malware. It primarily targets Chinese-speaking users by harvesting credentials and delivering malware via popular Chinese services and applications. DKnife comprises seven Linux-based implants that enable a wide range of malicious activities, including DNS hijacking, binary download hijacking, and real-time user activity monitoring. The framework is linked to the Earth Minotaur threat activity cluster and shares infrastructural connections with WizardNet, a Windows implant deployed by TheWizards APT group. DKnife's infrastructure overlaps with a campaign delivering WizardNet, suggesting a shared development or operational lineage. The framework uses a component called yitiji.bin to create a bridged TAP interface on the router at the private IP address 10.3.3.3, allowing the threat actor to intercept and rewrite network packets in transit to the intended host. Additionally, DKnife monitors WeChat activities more analytically, tracking voice and video calls, text messages, images sent and received, and articles read on the platform.

Critical Unauthenticated RCE Flaw in SmarterMail Patched

Updated: 06.02.2026 19:16 · First: 30.01.2026 09:09 · 📰 2 src / 3 articles

SmarterTools has addressed a critical unauthenticated remote code execution (RCE) flaw in SmarterMail email software, tracked as CVE-2026-24423 with a CVSS score of 9.3. The vulnerability allows attackers to execute arbitrary OS commands by pointing SmarterMail to a malicious HTTP server. The flaw was discovered by researchers from watchTowr, CODE WHITE GmbH, and VulnCheck and was patched in version Build 9511, released on January 15, 2026. CISA has added CVE-2026-24423 to its KEV catalog, marking it as actively exploited in ransomware campaigns, and has given federal agencies until February 26, 2026, to patch or stop using affected versions. Additionally, another critical flaw (CVE-2026-23760) and a medium-severity vulnerability (CVE-2026-25067) were also addressed in subsequent updates.

EFF Launches 'Encrypt It Already' Campaign for Big Tech E2EE Adoption

Updated: · First: 06.02.2026 18:34 · 📰 1 src / 1 articles

The Electronic Frontier Foundation (EFF) has launched the 'Encrypt It Already' campaign urging major technology and communications companies to prioritize end-to-end encryption (E2EE) for user data and communications. The initiative focuses on three key areas: releasing promised E2EE features, enabling them by default, and launching data protection capabilities already available from competitors. The campaign highlights companies like Bluesky, Ring, and Google for their delayed or optional E2EE implementations. The EFF emphasizes the importance of E2EE in protecting user privacy from third-party access, including law enforcement and government agencies. The campaign also addresses the growing privacy concerns exacerbated by the rise of artificial intelligence (AI) and its potential for misuse. The EFF aims to hold companies accountable for their privacy promises and empower users to control their data.

Substack Data Breach Exposes User Email Addresses and Phone Numbers

Updated: 06.02.2026 18:22 · First: 05.02.2026 14:54 · 📰 2 src / 2 articles

Substack has confirmed a data breach that occurred in October 2025, during which attackers stole email addresses and phone numbers. The breach was detected on February 3, 2026, and confirmed via an email notification to users on February 5, 2026. Substack assured users that no credentials or financial information were accessed. A threat actor later leaked a database containing 697,313 records on BreachForums, claiming the data was scraped. Substack has patched the vulnerability and warned users about potential phishing attempts. Substack has a history of privacy incidents, including a 2020 email exposure. The platform has grown significantly since its launch in 2017, reaching over 50 million active subscriptions, including five million paid, by March 2025.

Browser Attacks Evasion of Traditional Security Measures

Updated: · First: 06.02.2026 17:01 · 📰 1 src / 1 articles

Modern enterprise work heavily relies on browsers for accessing SaaS applications, identity providers, and AI tools. However, traditional security architectures focus on endpoints, networks, and email, leaving a significant visibility gap in browser activities. This gap allows a class of browser-only attacks to evade detection and investigation, posing a growing challenge for security teams. In 2026, browser attacks continue to leave little traditional evidence, making them difficult to detect and mitigate. These attacks include clickfix and UI-driven social engineering, malicious extensions, man-in-the-browser attacks, and HTML smuggling. Each of these attack types exploits the lack of visibility into browser activities, making them hard to prevent and investigate. The gap in browser-level observability is widening due to the increasing use of AI tools and AI-native browsers, which normalize actions like copying, pasting, and uploading sensitive information. This makes it even more challenging for security teams to evaluate risks and set effective controls.

EU Fines TikTok for Addictive Design Violating Digital Services Act

Updated: · First: 06.02.2026 15:53 · 📰 1 src / 1 articles

The European Commission is imposing a fine on TikTok for violating the Digital Services Act (DSA) due to its addictive design features, including infinite scroll, autoplay, and personalized recommendations. The commission found that TikTok failed to assess the potential harm to users' physical and mental well-being, particularly minors and vulnerable adults. The fine could reach up to 6% of TikTok's global annual turnover if the findings are confirmed. TikTok is required to modify its core service design to include screen time breaks and disable addictive features.

CISA Mandates Replacement of End-of-Life Edge Devices in Federal Networks

Updated: 06.02.2026 15:43 · First: 06.02.2026 10:41 · 📰 2 src / 2 articles

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 26-02) requiring federal agencies to identify, remove, and replace end-of-life (EOL) edge devices, including routers, firewalls, and network switches, that no longer receive security updates. The directive aims to mitigate the substantial and constant threat of exploitation by advanced threat actors targeting these vulnerable devices. Agencies must decommission EOL devices within 12 to 18 months and establish continuous discovery processes to identify and manage devices approaching end-of-support status. CISA has also developed an end-of-support edge device list to assist agencies in this effort.

KEV Collider Tool Enhances Vulnerability Triage for Security Teams

Updated: · First: 06.02.2026 14:53 · 📰 1 src / 1 articles

A new tool called KEV Collider has been developed to help security teams better triage the Known Exploited Vulnerabilities (KEV) Catalog by the US Cyber and Infrastructure Security Agency (CISA). The tool allows teams to filter vulnerabilities based on various criteria, making the list more relevant to their environments. The KEV Catalog, while useful, does not always align with the cybersecurity priorities of most organizations, often including vulnerabilities that are low-severity or low-probability for many companies. The KEV Collider integrates data from the KEV Catalog with other sources like CVSS scores, EPSS scores, and Metasploit exploit availability to provide a more comprehensive view. The tool aims to help security teams make better decisions about which vulnerabilities to prioritize, especially as the number of vulnerabilities continues to grow. The creator, Tod Beardsley, emphasizes that the KEV Catalog should not be treated as a must-patch list for all organizations, as it is primarily tailored to the needs of the federal civilian executive branch.

Kyle Svara Pleads Guilty to Hacking 600+ Snapchat Accounts for Exploitative Purposes

Updated: · First: 06.02.2026 14:34 · 📰 1 src / 1 articles

Kyle Svara, a 26-year-old from Illinois, pleaded guilty to hacking nearly 600 women's Snapchat accounts to steal nude photos. He used phishing and social engineering tactics to obtain access codes, then sold or traded the stolen content. Svara also worked with former university coach Steve Waithe, who was convicted of sextortion. Svara faces multiple charges, including aggravated identity theft and wire fraud, with sentencing scheduled for May 18, 2026.

Asian State-Backed Group TGR-STA-1030 Targets 70 Government and Infrastructure Entities

Updated: · First: 06.02.2026 14:07 · 📰 1 src / 1 articles

A previously undocumented cyber espionage group, TGR-STA-1030, has breached at least 70 government and critical infrastructure organizations across 37 countries over the past year. The group, assessed to be of Asian origin, leverages phishing emails and exploits N-day vulnerabilities to deploy malware and maintain long-term access for espionage purposes. Targets include national law enforcement, ministries of finance, and departments related to economic, trade, natural resources, and diplomatic functions. The group uses a variety of tools, including Cobalt Strike, Behinder, and a Linux kernel rootkit named ShadowGuard.

Samsung Knox Enhances Mobile Network Security with Granular Controls and Zero Trust

Updated: · First: 06.02.2026 12:30 · 📰 1 src / 1 articles

Samsung Knox introduces advanced network security features for mobile devices, including granular firewall controls and Zero Trust Network Access (ZTNA). These features address the unique challenges of mobile device security, such as intermittent network connections and diverse app usage. The Knox Firewall provides detailed visibility and control over app-specific network access, while the ZTNA framework integrates with existing VPNs to offer continuous, context-aware access decisions. This approach reduces the attack surface and enhances threat response capabilities. The integration of these features within Samsung Galaxy devices ensures seamless deployment and compatibility with existing security infrastructure, making it a practical solution for enterprise mobile security.

Flickr Data Exposure via Third-Party Email Service Vulnerability

Updated: · First: 06.02.2026 11:43 · 📰 1 src / 1 articles

Flickr disclosed a potential data breach affecting user information after a vulnerability in a third-party email service provider's system. The exposed data includes names, email addresses, IP addresses, and account activity. Flickr shut down the affected system within hours of discovering the issue on February 5, 2026. The company assured that passwords and payment card numbers were not compromised and advised users to review their account settings and update passwords.

Malicious dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Updated: · First: 06.02.2026 10:40 · 📰 1 src / 1 articles

Legitimate dYdX-related packages on npm and PyPI have been compromised to distribute malicious versions that steal cryptocurrency wallet credentials and execute remote access trojans (RATs). The compromised packages target JavaScript and Python ecosystems, with different payloads for each. The attack is suspected to involve developer account compromise, allowing threat actors to push malicious updates using legitimate credentials. The affected packages include @dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, and 1.0.31, and dydx-v4-client (PyPI) version 1.1.5post1. The malicious code targets core registry files and uses obfuscation techniques to evade detection. Users are advised to isolate affected machines, move funds to new wallets from clean systems, and rotate all API keys and credentials. This incident highlights a persistent pattern of supply chain attacks targeting dYdX-related assets.

Infosecurity Europe Launches Cyber Startup Programme for 2026

Updated: · First: 06.02.2026 10:30 · 📰 1 src / 1 articles

Infosecurity Europe introduces the Cyber Startup Programme to support emerging cybersecurity innovators. The initiative includes a dedicated exhibition area, tailored conference sessions, and a startup award competition. The program aims to provide visibility, networking opportunities, and growth support for early-stage companies. The Cyber Startup Programme will debut at Infosecurity Europe 2026, featuring a dedicated Cyber Startups Zone and a live award competition on June 2, 2026. The program is delivered in collaboration with UK Cyber Flywheel and the UK Department for Science, Innovation and Technology (DSIT).

Claude Opus 4.6 Identifies 500+ High-Severity Flaws in Open-Source Libraries

Updated: · First: 06.02.2026 07:49 · 📰 1 src / 1 articles

Anthropic's Claude Opus 4.6, a large language model (LLM), discovered over 500 previously unknown high-severity security flaws in major open-source libraries such as Ghostscript, OpenSC, and CGIF. The model, launched on February 6, 2026, demonstrated improved capabilities in code review, debugging, and vulnerability detection. The flaws were identified without requiring task-specific tooling or specialized prompting. Anthropic validated each flaw to ensure they were not hallucinated and prioritized severe memory corruption vulnerabilities. The identified vulnerabilities have since been patched by the respective maintainers.

Zscaler Acquires SquareX to Enhance Browser Security

Updated: · First: 06.02.2026 04:48 · 📰 1 src / 1 articles

Zscaler has acquired SquareX, a browser security firm, to integrate its Browser Detection and Response (BDR) solution into its Zero Trust Exchange platform. The acquisition aims to extend security to unmanaged devices, allowing organizations to secure users within their preferred browsers like Google Chrome and Microsoft Edge without needing a full agent or a separate enterprise browser. The deal closed on February 5, 2026, and is part of Zscaler's strategy to enhance its security capabilities.

Spain's Ministry of Science shuts down systems after IDOR exploit claims

Updated: · First: 05.02.2026 23:23 · 📰 1 src / 1 articles

Spain's Ministry of Science has partially shut down its IT systems following a claimed breach by a threat actor using the alias 'GordonFreeman.' The ministry cited a 'technical incident' and suspended administrative procedures. The attacker claims to have exploited an Insecure Direct Object Reference (IDOR) vulnerability to gain admin-level access and leaked data samples, including personal records and official documents. The authenticity of the leaked data has not been confirmed.

Ransomware operators abuse ISPsystem VMs for stealthy payload delivery

Updated: · First: 05.02.2026 22:57 · 📰 1 src / 1 articles

Ransomware operators are exploiting virtual machines (VMs) provisioned by ISPsystem's VMmanager to host and deliver malicious payloads at scale. Researchers at Sophos observed this tactic during investigations into 'WantToCry' ransomware incidents, noting that attackers used Windows VMs with identical hostnames, suggesting default templates generated by VMmanager. The same hostnames were found in the infrastructure of multiple ransomware groups, including LockBit, Qilin, Conti, BlackCat/ALPHV, and Ursnif, as well as various malware campaigns involving RedLine and Lummar info-stealers. ISPsystem's VMmanager platform allows malicious actors to spin up VMs for command-and-control (C2) and payload-delivery infrastructure, hiding malicious systems among thousands of innocuous ones. This complicates attribution and makes quick takedowns unlikely. The majority of the malicious VMs were hosted by a small cluster of providers with a bad reputation or sanctions, including Stark Industries Solutions Ltd., Zomro B.V., First Server Limited, Partner Hosting LTD, and JSC IOT.

Microsoft Announces Phased Retirement of Exchange Web Services (EWS) in Exchange Online

Updated: · First: 05.02.2026 20:07 · 📰 1 src / 1 articles

Microsoft plans to retire Exchange Web Services (EWS) for Exchange Online by April 2027, beginning with a phased disablement starting October 2026. EWS, a cross-platform API for accessing Exchange mailbox items, will no longer be supported in Exchange Online but will remain functional in on-premises Exchange Server installations. Administrators can manage the transition via an application allowlist, and Microsoft will conduct 'scream tests' to identify hidden dependencies. Developers are advised to migrate to the Microsoft Graph API, which offers near-complete feature parity with EWS.

Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure

Updated: 05.02.2026 19:25 · First: 02.09.2025 18:52 · 📰 17 src / 32 articles

The **Aisuru/Kimwolf botnet ecosystem** has escalated its global threat, now conducting **record-breaking DDoS campaigns**—including a **31.4 Tbps attack in November 2025** and a **holiday-themed "The Night Before Christmas" campaign** (December 19, 2025) with peaks of **24 Tbps, 9 Bpps, and 205 Mrps**. This follows the **29.7 Tbps assault in Q3 2025** and **disruption of the IPIDEA proxy network** (January 2026), which had enabled the botnets’ **lateral movement into government, healthcare, and critical infrastructure networks** via **33,000+ compromised endpoints** in universities and **8,000 in U.S./foreign government systems**. With **over 6 million infected devices** (1–4M IoT for Aisuru; **>2M Android TVs/boxes** for Kimwolf), the botnets now blend **hyper-volumetric DDoS** with **residential proxy monetization**, targeting sectors beyond gaming to include **telecom, IT, finance, and AI companies**. Cloudflare reported **47.1 million DDoS attacks mitigated in 2025** (100% YoY increase), with **hyper-volumetric incidents surging 40% QoQ in Q4**—highlighting the botnets’ **rapid evolution in scale, sophistication, and cross-sector impact**. Despite **Google’s January 2026 takedown of IPIDEA** (reducing proxy devices by millions), persistent infections and **new attack vectors** (e.g., **trojanized apps, ENS-based C2**) underscore the ongoing systemic risk to **global internet stability and enterprise security**.

Cyberattack Disrupts La Sapienza University IT Systems

Updated: · First: 05.02.2026 19:02 · 📰 1 src / 1 articles

Rome’s La Sapienza University suffered a cyberattack that disrupted its IT systems, causing widespread operational disruptions. The university shut down its network systems as a precautionary measure to ensure data integrity and security. The attack is suspected to be ransomware, attributed to the pro-Russian threat actor Femwar02, with similarities to the Bablock/Rorschach ransomware strain. The university is working with Italian cybersecurity authorities to restore systems from backups. The university has not disclosed the ransom amount, but the risk of data leakage remains significant. Students and staff are advised to remain vigilant against phishing attacks.

Qilin ransomware group targets multiple organizations, including South Korean financial sector and Romanian oil pipeline operator Conpet

Updated: 05.02.2026 17:15 · First: 19.08.2025 17:25 · 📰 19 src / 23 articles

The Qilin ransomware group has been active, targeting multiple organizations, including Inotiv, a U.S.-based pharmaceutical company, Creative Box Inc. (CBI), a subsidiary of Nissan, Mecklenburg County Public Schools (MCPS), Asahi Group, Synnovis, a UK pathology services provider, and Conpet, Romania's national oil pipeline operator. The latest attack was on Conpet, where Qilin claims to have stolen nearly 1TB of documents and leaked over a dozen photos of internal documents containing financial information and passport scans as proof of the breach. The attack caused significant operational disruption, including the temporary takedown of the company's website. The group has also targeted other Japanese companies, including Shinko Plastics and Osaki Medical. The Qilin ransomware group operates as a ransomware-as-a-service (RaaS) network, providing tools and infrastructure to affiliates and taking a 15–20% share of ransom payments. The group's malware is custom-built in Rust and C for cross-platform attacks, including Windows, Linux, and ESXi systems. The Qilin ransomware operation was first launched as "Agenda" in August 2022 and rebranded to Qilin by September 2022. Qilin ransomware operation has attacked more than 700 victims across 62 countries in 2025. The Qilin ransomware operation has published over 40 new victims per month in the second half of 2025. The Qilin ransomware operation uses the Windows Subsystem for Linux (WSL) to execute Linux encryptors on Windows systems, evading traditional security tools. Qilin ransomware group has been observed exploiting unpatched VPN appliances and lack of multi-factor authentication (MFA) to gain initial access to corporate networks. Qilin ransomware group has been observed targeting small-to-medium-sized businesses in the construction, healthcare, and financial sectors. Qilin ransomware group has been observed using new extortion channels, including Telegram and public sites such as WikiLeaksV2. Qilin ransomware group has been observed collaborating with affiliates of the Scattered Spider group. Qilin ransomware group has been observed operating as a ransomware-as-a-service (RaaS) group since 2023, leasing its tools and infrastructure to affiliates. Qilin ransomware group has been observed publishing victims' data on dark-web leak sites if no ransom is paid. Asahi Group Holdings confirmed that the personal data of approximately 1.914 million individuals, including 1.525 million customers, was or may have been exposed in the cyber-attack. The exposed data includes names, genders, dates of birth, postal addresses, email addresses, and phone numbers. Asahi Group Holdings spent two months investigating the breach, conducting root cause analysis, integrity checks, containing the ransomware, restoring systems, and strengthening security. Atsushi Katsuki, President and Group CEO of Asahi Group Holdings, publicly apologized for the difficulties caused by the disruptions. Asahi Group Holdings is reviewing the potential impact of the incident on its financial results for fiscal year 2025. The Qilin ransomware group claimed responsibility for the cyber-attack on Asahi Group Holdings. Asahi Group Holdings temporarily suspended its operations in Japan in late September following a system failure due to the ransomware attack. The disruptions included order and shipment operations, call centers, and customer service desks. Asahi Group Holdings postponed the launch of a new product scheduled to be released in October due to the cyber-attack. On October 7, the Qilin ransomware group listed Asahi on its data leak site, claiming to have stolen 27 GB of files from the company. Inotiv is notifying 9,542 individuals that their personal information was stolen in the August 2025 ransomware attack. Inotiv has restored availability and access to impacted networks and systems affected by the August 2025 ransomware attack. The Qilin ransomware group claimed responsibility for the breach in August 2025, leaked data samples, and said they exfiltrated over 162,000 files totaling 176 GB from Inotiv. Asahi Group Holdings is considering the creation of a dedicated cybersecurity unit within the group. Asahi Group Holdings is scrapping the use of virtual private networks (VPNs) and is adopting a stricter zero-trust model. Asahi Group Holdings has postponed the disclosure of sales performance for its operating due to the ongoing effects of the cyber-attack on its systems. Asahi Group Holdings recorded a 20% year-on-year drop in alcohol sales in Japan in November 2025 due to the cyber-attack. Asahi Group Holdings has refrained from releasing monthly sales data by category and brand due to the ongoing effects of the cyber-attack on its systems. November marks the third consecutive month Asahi Group Holdings has skipped disclosures of sales data, citing difficulties in accurately compiling the figures.

Cloud Migration Blind Spots Addressed with Network-Layer Telemetry

Updated: · First: 05.02.2026 17:00 · 📰 1 src / 1 articles

Cloud migrations introduce security blind spots due to dynamic infrastructure and overlapping APIs, necessitating real-time visibility for effective cyber defense. Network-layer telemetry provides consistent, provider-agnostic signals for detection and investigation, overcoming the challenges of cloud log standardization. Adversaries exploit cloud environments through supply-chain compromises, infostealer-led intrusions, and misuse of managed services, highlighting the need for comprehensive network monitoring. Effective cloud security involves monitoring east-west and north-south traffic, container traffic, TLS metadata, DNS data, and flow logs. Establishing baselines, alerting on anomalies, and continuous validation are key steps in maintaining robust cloud security.

GitHub Codespaces RCE via Malicious Repository Configurations

Updated: · First: 05.02.2026 16:30 · 📰 1 src / 1 articles

Researchers at Orca Security discovered multiple attack vectors in GitHub Codespaces that allow remote code execution (RCE) by exploiting default behaviors in cloud-based development environments. These vulnerabilities enable attackers to execute arbitrary commands, steal credentials, and access sensitive resources without explicit user approval. The issue arises from the automatic execution of repository-defined configuration files, which can be manipulated to trigger malicious activities upon environment startup or when checking out a pull request.

Smartphones Critical to Police Investigations, Challenges Highlighted

Updated: · First: 05.02.2026 15:30 · 📰 1 src / 1 articles

A report from Cellebrite reveals that smartphones are now a key source of digital evidence in nearly all police investigations. The 2026 Industry Trends Report, based on interviews with 1200 law enforcement practitioners, shows a significant increase in the reliance on digital evidence, with 95% agreeing it is crucial for solving cases. Smartphones are cited as the top source of digital evidence, and agencies are reallocating resources to digital investigations. However, the complexity of digital evidence and challenges such as locked devices and training gaps are increasing workloads.

Increased Operational Efficiency in Cyber Threats

Updated: · First: 05.02.2026 14:57 · 📰 1 src / 1 articles

Recent cyber threat intelligence highlights a trend toward operational efficiency in attacker techniques. Intrusions are starting from ordinary workflows and tools, with attackers industrializing their operations through shared infrastructure, repeatable playbooks, and affiliate-style ecosystems. The focus is on reducing time between access and impact, leveraging automation, and exploiting known security gaps rather than unknown threats.

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asian Espionage Campaigns

Updated: 05.02.2026 13:50 · First: 04.02.2026 16:09 · 📰 2 src / 2 articles

Amaranth-Dragon, a China-linked threat actor, has conducted targeted espionage campaigns against government and law enforcement agencies in Southeast Asia throughout 2025. The group exploited CVE-2025-8088, a WinRAR vulnerability, to deliver malicious payloads, including the Havoc C2 framework and TGAmaranth RAT. The campaigns were timed to coincide with sensitive political and security events, demonstrating a high degree of stealth and operational discipline. The group's tactics, tools, and procedures (TTPs) show strong links to APT41, suggesting a shared ecosystem or resource pool. The attackers leveraged the vulnerability within days of its disclosure in August 2025 and used the Havoc Framework as the Command and Control (C&C) platform.

Emergence of AI Usage Control as a Critical Security Category

Updated: · First: 05.02.2026 13:30 · 📰 1 src / 1 articles

The rapid proliferation of AI tools in enterprise environments has outpaced traditional security controls, creating a governance gap. AI Usage Control (AUC) has emerged as a new category to address this gap by focusing on real-time interaction governance rather than legacy tool-centric approaches. Enterprises are encouraged to adopt AUC to manage AI risks effectively, ensuring visibility and control over AI interactions across various platforms and tools.

Betterment Data Breach Exposes 1.4 Million Accounts

Updated: · First: 05.02.2026 13:16 · 📰 1 src / 1 articles

A data breach at Betterment, a fintech firm managing $65 billion in assets, exposed personal information of 1.4 million accounts. The breach, occurring in January 2026, involved stolen email addresses, names, geographic data, dates of birth, physical addresses, phone numbers, device information, and employment details. The attackers also sent fraudulent emails attempting to lure customers into a cryptocurrency scam. Betterment confirmed no customer accounts or login information were compromised, but the breach included significant contact information.