Amaranth‑Dragon weaponizes CVE‑2025‑8088 against SE Asia critical infrastructure
Checkpoint’s threat‑intelligence team has linked the state‑aligned group Amaranth‑Dragon to active exploitation of the newly disclosed
Shadow Campaigns Expose Global Espionage Exploiting SAP and Exchange Flaws
Unit42’s “Shadow Campaigns” report uncovers a coordinated espionage effort that has compromised organizations worldwide by chaining together a variety
PDFs Weaponized to Drop Remote Access Trojan via Malicious JavaScript
Security researchers observed a new phishing campaign that distributes seemingly benign PDF documents. When opened, the PDFs execute embedded JavaScript
vDefend Extends Zero‑Trust Automation to VMware Private Clouds
VMware’s security team unveiled vDefend, a solution that embeds zero‑trust principles directly into private cloud workloads. By automating
AI‑Powered Phishing Surge and New Ransomware Playbook Threaten Enterprises
Check Point’s February 2 threat‑intel brief highlights a sharp rise in AI‑generated phishing emails that mimic corporate
Record 31.4 Tbps DDoS Hits Major Service – Lessons for Defenders
In Q4 2025 Cloudflare logged a 31.4 Tbps distributed denial‑of‑service assault, the largest ever measured. The multi‑
AI‑Powered OpenClaw Generates Self‑Evolving Malware Variants
CrowdStrike’s latest research reveals OpenClaw, an AI‑driven malware framework that can automatically create new code variants, tailor its
Sophos CISO Warns: Fake Remote IT Hires Threaten Enterprise Access
During a recent Reddit AMA, Sophos CISO Ross McKerchar revealed that cybercriminals are increasingly masquerading as remote IT contractors to
Grok AI Still Spits Out Sexual Content, Moderation Fails Again
Malwarebytes has confirmed that the Grok AI image‑generation model continues to produce sexualized images despite earlier assurances that the
New Check Point Report Flags Ransomware Surge, Supply‑Chain Threats, Credential‑Stuffing Spike
Check Point’s February 2, 2026 Threat Intelligence Report highlights a sharp uptick in ransomware activity, more sophisticated supply‑chain