7secure

04
Feb
Critical SolarWinds Web Help Desk Flaw Actively Exploited, Remote Code Execution Possible

Critical SolarWinds Web Help Desk Flaw Actively Exploited, Remote Code Execution Possible

A remote code execution vulnerability (CVE‑2024‑XXXX) has been discovered in SolarWinds Web Help Desk and is now being
1 min read
04
Feb
Amaranth‑Dragon Weaponizes CVE‑2025‑8088 in Southeast Asian Espionage Surge

Amaranth‑Dragon Weaponizes CVE‑2025‑8088 in Southeast Asian Espionage Surge

Check Point researchers have traced a new wave of activity to the Amaranth‑Dragon threat group, a known offshoot of
1 min read
04
Feb
CrowdStrike Tops Gartner Peer Insights as Preferred ASPM Tool for Defenders

CrowdStrike Tops Gartner Peer Insights as Preferred ASPM Tool for Defenders

CrowdStrike was named a Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer report for Application Security
1 min read
04
Feb
Application security tools surge 🚀 while APT espionage intensifies in Asia 🐉.

Application security tools surge 🚀 while APT espionage intensifies in Asia 🐉.

Good morning, here is your daily cybersecurity and AI threat intelligence roundup for February 4, 2026. Today's headlines
6 min read
04
Feb
Amaranth‑Dragon Exploits WinRAR CVE‑2025‑8088 for Southeast Asian Espionage

Amaranth‑Dragon Exploits WinRAR CVE‑2025‑8088 for Southeast Asian Espionage

A China‑linked threat group identified as Amaranth‑Dragon is leveraging the recent WinRAR vulnerability (CVE‑2025‑8088) to distribute
1 min read
04
Feb
vDefend Brings Real‑Time Zero‑Trust Lateral Defense to VMware Private Cloud

vDefend Brings Real‑Time Zero‑Trust Lateral Defense to VMware Private Cloud

VMware announced vDefend, a new security layer that extends zero‑trust principles to workloads running in private clouds. The solution
1 min read
04
Feb
Inside the Mind Games Powering Modern Phishing Attacks

Inside the Mind Games Powering Modern Phishing Attacks

Unit42’s latest investigation dissects how threat actors weaponize basic human instincts—authority, urgency, and social proof—to drive phishing
1 min read
04
Feb
Ransomware‑as‑a‑Service, APT Supply‑Chain Resurgence, and AI Phishing Surge

Ransomware‑as‑a‑Service, APT Supply‑Chain Resurgence, and AI Phishing Surge

Check Point’s February 2 threat‑intel briefing highlights three converging trends. Ransomware‑as‑a‑Service (RaaS) operations have jumped
1 min read
04
Feb
Watering‑Hole Campaign Plants ScanBox Keylogger on Target Sites

Watering‑Hole Campaign Plants ScanBox Keylogger on Target Sites

APT group TA423 is leveraging compromised legitimate websites as watering‑hole vectors. When a user visits an infected page, the
1 min read
04
Feb

Open‑Source Tool Abuse Fuels Global Cyber Attacks, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory highlighting a surge in the use of publicly available, open‑
1 min read