Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models on February 4, 2026 Posted by The Hacker News
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files on February 4, 2026 Posted by The Hacker News
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns on February 4, 2026 Posted by The Hacker News
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia on February 4, 2026 Posted by samanthar@checkpoint.com
Posted in Hacking news Your Digital Footprint Can Lead Right to Your Front Door on January 16, 2026 The Hacker News
Posted in Hacking news LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing on January 16, 2026 The Hacker News
Posted in Social media Why LinkedIn is a hunting ground for threat actors – and how to protect yourself on January 16, 2026 WeLiveSecurity
Posted in Hacking news China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure on January 16, 2026 The Hacker News
Posted in Hacking news Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways on January 15, 2026 The Hacker News
ISC Stormcast For Friday, January 16th, 2026 https://isc.sans.edu/podcastdetail/9770, (Fri, Jan 16th) on January 15, 2026 SANS Internet Storm Center, InfoCON: green
Windows Internals: Check Your Privilege – The Curious Case of ETW’s SecurityTrace Flag on January 15, 2026 Connor McGarr
Posted in Hacking news AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks on January 15, 2026 The Hacker News
Posted in AI WEF: AI overtakes ransomware as fastest-growing cyber risk on January 15, 2026 Graham Cluley
Posted in Hacking news Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access on January 15, 2026 The Hacker News