Saturday, February 7, 2026

Cybersecurity

Okta Warns of Major Cyberattacks Targeting Customers

Okta has identified a credential stuffing attack exploiting cross-origin authentication in its Customer Identity Cloud. Customers are advised to disable unused cross-origin features...

Sneaky Code in WordPress Plugin Steals Credit Card Data

Vulnerability in the Dessky Snippets plugin allows attackers to inject malicious code. The malware modifies WooCommerce checkout forms to steal credit card info. ...

New Ransomware ‘ShrinkLocker’ Exploits Windows BitLocker to Encrypt and Steal Files

ShrinkLocker ransomware shrinks non-boot partitions and uses BitLocker to encrypt files. Targets include government agencies, manufacturers, and pharmaceutical firms. Unique features include no...

Ivanti Patches Multiple Critical Security Vulnerabilities in Endpoint Manager and Other Products

Ivanti has released patches to address multiple critical security vulnerabilities in its Endpoint Manager (EPM) that could be exploited to achieve remote code...

Windows Admins Targeted by Sneaky Malvertising Scam

Hackers create fake websites mimicking WinSCP and PuTTY, tricking admins via search engine ads. Malicious downloads deploy ransomware, possibly BlackCat/ALPHV, risking significant data...

Hackers Exploit Windows Quick Assist for Ransomware Attacks

Hackers flood victims' emails with spam and impersonate IT support via phone calls. They use Windows Quick Assist to gain remote access and...

Microsoft Launches Revolutionary AI for Intelligence Services

Microsoft has unveiled an AI model for US intelligence that operates offline for maximum security. Developed over 18 months and based on GPT-4,...

Leveraging Machine Learning to Combat Cybersecurity Fraud

Cybersecurity threats loom large, posing significant risks to individuals, businesses, and organizations worldwide. Among the myriad challenges faced by cybersecurity professionals, fraud remains...