Critical SolarWinds Web Help Desk Flaw Actively Exploited, Remote Code Execution Possible
A remote code execution vulnerability (CVE‑2024‑XXXX) has been discovered in SolarWinds Web Help Desk and is now being
Amaranth‑Dragon Weaponizes CVE‑2025‑8088 in Southeast Asian Espionage Surge
Check Point researchers have traced a new wave of activity to the Amaranth‑Dragon threat group, a known offshoot of
CrowdStrike Tops Gartner Peer Insights as Preferred ASPM Tool for Defenders
CrowdStrike was named a Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer report for Application Security
Application security tools surge 🚀 while APT espionage intensifies in Asia 🐉.
Good morning, here is your daily cybersecurity and AI threat intelligence roundup for February 4, 2026.
Today's headlines
Amaranth‑Dragon Exploits WinRAR CVE‑2025‑8088 for Southeast Asian Espionage
A China‑linked threat group identified as Amaranth‑Dragon is leveraging the recent WinRAR vulnerability (CVE‑2025‑8088) to distribute
vDefend Brings Real‑Time Zero‑Trust Lateral Defense to VMware Private Cloud
VMware announced vDefend, a new security layer that extends zero‑trust principles to workloads running in private clouds. The solution
Inside the Mind Games Powering Modern Phishing Attacks
Unit42’s latest investigation dissects how threat actors weaponize basic human instincts—authority, urgency, and social proof—to drive phishing
Ransomware‑as‑a‑Service, APT Supply‑Chain Resurgence, and AI Phishing Surge
Check Point’s February 2 threat‑intel briefing highlights three converging trends. Ransomware‑as‑a‑Service (RaaS) operations have jumped
Watering‑Hole Campaign Plants ScanBox Keylogger on Target Sites
APT group TA423 is leveraging compromised legitimate websites as watering‑hole vectors. When a user visits an infected page, the
Open‑Source Tool Abuse Fuels Global Cyber Attacks, CISA Warns
The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory highlighting a surge in the use of publicly available, open‑