Saturday, February 7, 2026

Cybersecurity

Why Civil Society Says Swiss Data Retention Plans Go Too Far

Civil society groups say expanded data retention would violate fundamental rights VPNs, messaging apps, and social platforms could be forced to store user...

Unit 42 Warns of On Demand Phishing Pages Powered by Legitimate LLM APIs

Attackers can use LLM APIs to generate phishing pages in real time inside a victim’s browser. Each victim may see a different JavaScript...

CrowdStrike and Nord Security bring Falcon protection into NordLayer for SMBs

CrowdStrike Falcon Go and Falcon Enterprise are being integrated into NordLayer for SMB customers. The bundle combines endpoint protection with business VPN and...

Microsoft Adds Another Security Shield to Teams, This Time for Fake Brand Calls

Microsoft Teams will warn users about possible brand impersonation calls from first time external callers. Users will be able to accept, block, or...

FortiGate firewalls targeted in automated account creation and data theft campaign

Attackers are exploiting a FortiGate SSO weakness to create rogue admin accounts. They are stealing firewall configuration data, likely using automation. FortiOS 7.4.10...

Hackers Found a New Way to Trick Gemini Through Calendar Invites

Researchers found a prompt injection method that used Google Calendar invites to manipulate Gemini. Attackers could hide instructions inside event details to make...

Hacker flaunts stolen government data on Instagram

Nicholas Moore pleaded guilty to repeatedly hacking the US Supreme Court’s electronic filing system. New court filings say he also accessed AmeriCorps and...

Hackers are exploiting a critical WordPress flaw in Modular DS

Modular DS versions 2.5.1 and older have a critical security flaw Attackers can bypass authentication and gain admin access remotely The issue is...

Pax8 data exposure puts thousands of MSP relationships under scrutiny

Pax8 accidentally emailed a spreadsheet containing sensitive partner and customer business data. Around 1,800 MSPs were affected through a file shared with fewer...

Hackers Allege Massive Theft of Target Source Code After Cyber Incident

Hackers claim to be selling 860GB of internal Target source code and documentation Sample repositories reference payment, identity, and gift card systems Target...

US Agencies Urged to Patch Actively Exploited Gogs Flaw

Gogs has a high severity flaw that allows remote code execution without authentication. The vulnerability is actively exploited and hundreds of servers are...