Cybersecurity News and Headlines

Microsoft Rolls Out Native Sysmon Monitoring in Windows 11
NewsFeb 4, 2026

Microsoft Rolls Out Native Sysmon Monitoring in Windows 11

Microsoft has begun rolling out native Sysmon functionality to Windows 11 Insider builds in the Beta and Dev channels. The built‑in service mirrors the popular Sysinternals Sysmon tool, logging process, file and clipboard events to the Windows Event Log. It remains...

By BleepingComputer
Former Nuance Communications Employee Facing More Charges in 2023 Geisinger Data Breach Case
NewsFeb 4, 2026

Former Nuance Communications Employee Facing More Charges in 2023 Geisinger Data Breach Case

Former Nuance Communications employee Max Vance has been hit with two additional false‑statement counts after a superseding indictment revealed he lied to FBI agents about downloading protected health information. The indictment follows his original charge of unlawfully accessing data belonging...

By DataBreaches.net
Banks Are Not Prepared for the Industrialization of Crypto Theft
NewsFeb 4, 2026

Banks Are Not Prepared for the Industrialization of Crypto Theft

Drainer‑as‑a‑Service (DaaS) platforms are industrializing crypto theft, letting low‑skill actors launch high‑value heists at scale. Traditional bank compliance, reliant on static blacklists, cannot keep pace with the real‑time, multi‑domain attacks these services enable. The author urges banks to shift from...

By American Banker Technology
Noah Taps Sumsub for Reusable KYC
NewsFeb 4, 2026

Noah Taps Sumsub for Reusable KYC

Financial infrastructure firm Noah has teamed up with identity‑verification specialist Sumsub to embed a reusable KYC framework across its platform. The integration enables users verified by any of Sumsub’s 4,000+ partner institutions to onboard on Noah‑powered wallets, exchanges and payment...

By Finextra
DMARC Alerts in Slack
NewsFeb 4, 2026

DMARC Alerts in Slack

EasyDMARC now pushes DMARC and email‑authentication alerts straight into Slack, turning a traditionally passive control into an active operational signal. The integration delivers high‑signal events—such as DNS record changes, authentication‑failure spikes, and policy shifts—complete with domain, severity and rationale, while...

By Security Boulevard
SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR
NewsFeb 4, 2026

SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR

SECNAP Network Security launched CloudJacket MXDR, a managed extended detection and response platform that unifies SOC, SIEM, and NDR functions under a single pane of glass. Built on the patented CloudJacket foundation, the solution adds multi‑tenant capabilities, AI‑augmented analyst workflows,...

By Help Net Security
Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV
NewsFeb 4, 2026

Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV

Interlock ransomware has added a zero‑day exploit in a gaming anti‑cheat driver (CVE‑2025‑61155) to its arsenal, deploying a signed kernel driver called UpdateCheckerX64.sys. The new BYOVD tool, dubbed Hotta Killer, creates a demand‑start service and uses DeviceIoControl to terminate security...

By GBHackers On Security
AI Bots Are Now a Signifigant Source of Web Traffic
NewsFeb 4, 2026

AI Bots Are Now a Signifigant Source of Web Traffic

The latest TollBit report, backed by Akamai data, shows AI‑driven scraping bots now account for a sizable share of web traffic, with one out of every 50 visits to monitored sites originating from such bots. AI bots are increasingly ignoring...

By WIRED AI
Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware
NewsFeb 4, 2026

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware

A sophisticated supply‑chain attack hijacked Notepad++'s update mechanism after a hosting‑provider breach, remaining active from June 2025 to December 2025. Attackers rotated command‑and‑control servers and deployed three distinct infection chains that delivered Cobalt Strike beacons and a custom Chrysalis backdoor. The...

By GBHackers On Security
The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
NewsFeb 4, 2026

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Eric Zimmerman of the SANS Institute argues that incident response failures stem more from early‑stage decisions than from tool gaps. He defines the "first 90 seconds" as a repeatable decision window that recurs each time a new system enters scope,...

By The Hacker News
Zero Trust in Practice: A Deep Technical Dive Into Going Fully Passwordless in Hybrid Enterprise Environments
NewsFeb 4, 2026

Zero Trust in Practice: A Deep Technical Dive Into Going Fully Passwordless in Hybrid Enterprise Environments

Eliminating passwords in hybrid Active Directory and Microsoft Entra ID environments requires a complete redesign of identity architecture, not a simple switch. Success hinges on three prerequisites—cloud Kerberos trust, device registration, and Conditional Access policies—forming a prerequisite triangle. Organizations must...

By CSO Online
OfferUp Scammers Are Out in Force: Here’s What You Should Know
NewsFeb 4, 2026

OfferUp Scammers Are Out in Force: Here’s What You Should Know

OfferUp, the 15‑year‑old U.S. marketplace that processes more than 30 million transactions each year, is grappling with a surge of fraud schemes. Scammers routinely steer buyers and sellers toward off‑platform payment methods such as Zelle, Venmo, gift‑card codes, or cash‑app transfers,...

By WeLiveSecurity
Snyk Unveils the AI Security Fabric
NewsFeb 4, 2026

Snyk Unveils the AI Security Fabric

Snyk introduced the AI Security Fabric, a continuous‑defense layer that spans the entire software development lifecycle. The Fabric unifies visibility, prevention, and governance across three vectors: AI‑accelerated DevSecOps, AI‑driven development, and AI‑native software. New data shows that each deployed AI...

By AI-TechPark
How Generative AI Is Transforming Fraud Detection in Digital Banking
NewsFeb 4, 2026

How Generative AI Is Transforming Fraud Detection in Digital Banking

Generative AI has become central to digital‑banking fraud defenses as AI‑powered scams now account for over half of global fraud incidents. Traditional rule‑based systems struggle with adaptive threats, prompting banks to adopt deep generative models that analyze transaction graphs and...

By Finextra
Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices
NewsFeb 4, 2026

Avast Brings Deepfake Scam Detection to Windows PCs and Mobile Devices

Avast announced the global rollout of its Scam Guardian and Scam Guardian Pro apps for Android and iOS, and introduced Deepfake Guard for Windows PCs. The new AI‑driven feature scans video audio in real time to detect malicious deepfake content, supporting...

By Help Net Security
Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments
NewsFeb 4, 2026

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments

Threat actors are increasingly targeting the NTDS.dit database, the core repository of Active Directory credentials and configuration, to gain unrestricted domain access. By creating Volume Shadow Copies and leveraging native tools such as ntdsutil, SecretsDump, and Mimikatz, attackers can extract...

By GBHackers On Security
Darwinium Tackles the Agentic AI Fraud Era With Strategic GTM Acceleration
NewsFeb 4, 2026

Darwinium Tackles the Agentic AI Fraud Era With Strategic GTM Acceleration

Darwinium announced an accelerated go‑to‑market push in North America, appointing Michael Rodriguez as Global Head of GTM and adding senior hires Donnie Gates and Melissa Griffin. The new team will help fintechs, banks and eCommerce merchants combat “agentic AI” fraud...

By AI-TechPark
OutSystems Achieves FedRAMP Authorization
NewsFeb 4, 2026

OutSystems Achieves FedRAMP Authorization

OutSystems announced it has earned Federal Risk and Authorization Management Program (FedRAMP) authorization, allowing its low‑code development platform to be used by U.S. federal agencies. The certification, achieved in partnership with cloud provider Knox, confirms that the platform meets stringent...

By AI-TechPark
Horizon3.ai Strengthens Global Partner Team for Faster Growth
NewsFeb 4, 2026

Horizon3.ai Strengthens Global Partner Team for Faster Growth

Horizon3.ai announced a major expansion of its global partner leadership, appointing Tim Mackie as Global Vice President of Worldwide Channels and highlighting Marc Inderhees on CRN’s 2026 Channel Chiefs list. The moves are designed to accelerate MSP‑ and partner‑led growth...

By AI-TechPark
Rebrand Cybersecurity From “Dr. No” To “Let’s Go”
NewsFeb 4, 2026

Rebrand Cybersecurity From “Dr. No” To “Let’s Go”

The article urges a cultural shift in cybersecurity, moving from a restrictive "Dr. No" stance to an enabling "Let's Go" approach. It highlights Cross Domain Solutions (CDS) as a hidden but critical technology that securely transfers and accesses data across...

By Security Boulevard
Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access
NewsFeb 4, 2026

Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

Mountain View police chief Mike Canfield ordered an immediate shutdown of the city’s Flock Safety automated license‑plate reader (ALPR) system after discovering that hundreds of unauthorized law‑enforcement agencies had been able to query the data for more than a year....

By The Cyber Express
Building a Zero-Trust Framework for Cloud Banking
NewsFeb 4, 2026

Building a Zero-Trust Framework for Cloud Banking

Financial institutions are moving beyond perimeter‑based defenses by adopting zero‑trust frameworks that continuously validate identities, devices, and services across multi‑cloud environments. The approach combines identity‑first security, micro‑segmentation, and AI‑driven risk analytics to meet stringent regulations such as PCI DSS, DORA, GDPR,...

By Security Boulevard
Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall
NewsFeb 4, 2026

Detectify Internal Scanning Finds and Fixes Vulnerabilities Behind the Firewall

Detectify introduced Internal Scanning, a tool that extends its external‑facing crawling and fuzzing engine into private networks, enabling security teams to locate and fix vulnerabilities behind the firewall with the same speed as external tests. The solution deploys via a...

By Help Net Security
CYGNVS Launches AI Model for Cyber Readiness and Response
NewsFeb 4, 2026

CYGNVS Launches AI Model for Cyber Readiness and Response

CYGNVS unveiled a purpose-built AI model for cyber readiness and incident response, trained on more than 20,000 real-world cyber incidents and outages. The model leverages proprietary data from Marsh, the leading cyber insurance broker, without exposing any client‑specific information. By...

By AI-TechPark
Lakelands Public Health Confirms Cyberattack, Says Sensitive Data Unaffected
NewsFeb 4, 2026

Lakelands Public Health Confirms Cyberattack, Says Sensitive Data Unaffected

On Jan 29, 2026, Lakelands Public Health confirmed a cyberattack that disrupted internal systems but left sensitive health records untouched. The agency activated its incident‑response plan, isolated affected assets, and hired a leading cybersecurity firm to investigate and restore services....

By The Cyber Express
Fasoo Advances Personal Data Protection with AI-Powered Detection and Encryption
NewsFeb 4, 2026

Fasoo Advances Personal Data Protection with AI-Powered Detection and Encryption

Fasoo unveiled an AI‑driven personal data protection suite combining Fasoo Data Radar and Fasoo AI‑R Privacy. The solution moves beyond keyword scans, using context‑aware models to detect PII across unstructured formats with fewer false positives. Detected data is automatically encrypted,...

By MarTech Series
Jennifer Duman of Skyhawk Security Named a 2026 CRN® Channel Chief
NewsFeb 4, 2026

Jennifer Duman of Skyhawk Security Named a 2026 CRN® Channel Chief

Skyhawk Security announced that Channel Director Jennifer Duman has been named a 2026 CRN® Channel Chief. Duman, who joined Skyhawk in 2025, has transformed the company’s channel‑first go‑to‑market model by automating onboarding and opportunity management. Under her guidance, Skyhawk’s partner...

By AI-TechPark
Mitiga Reports Exceptional Growth as Enterprises Embrace Real-Time Cloud Detection and Response
NewsFeb 4, 2026

Mitiga Reports Exceptional Growth as Enterprises Embrace Real-Time Cloud Detection and Response

Mitiga, the zero‑impact cloud detection and response leader, announced a 234% year‑over‑year sales surge in 2025 and rapid expansion following its Series B round led by SYN Ventures. The company doubled its workforce, launched a 25‑member CISO advisory board, and...

By AiThority
Tencent Cloud EdgeOne Launches Free AI Crawler Control: Empowering Developers to Reclaim Content Sovereignty
NewsFeb 4, 2026

Tencent Cloud EdgeOne Launches Free AI Crawler Control: Empowering Developers to Reclaim Content Sovereignty

Tencent Cloud EdgeOne has rolled out its Basic Bot Management suite to all users, including those on the free tier, introducing AI Crawler Control and a CAPTCHA Page. The AI Crawler Control leverages continuous User‑Agent recognition to detect and act...

By MarTech Series
Privilege Disruption: The Key Choke Point for Cyber Deterrence
NewsFeb 4, 2026

Privilege Disruption: The Key Choke Point for Cyber Deterrence

The article argues that privilege disruption is the critical choke point for effective cyber deterrence under the new 2026 White House Cyber Strategy. By denying and containing privileged access early, defenders shift the attacker’s risk‑benefit calculus, preventing initial footholds from...

By Security Magazine (Cybersecurity)
E-Commerce Fraud Set to More Than Double to $131 Billion by 2030
NewsFeb 4, 2026

E-Commerce Fraud Set to More Than Double to $131 Billion by 2030

Juniper Research projects global e‑commerce fraud to surge from $56 billion in 2025 to $131 billion by 2030, a 133 % increase. The spike is largely driven by "friendly fraud," which now accounts for the majority of chargeback disputes. Existing merchant defenses are...

By PaySpace Magazine
Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities
NewsFeb 4, 2026

Foxit Releases Security Updates for PDF Editor Cloud XSS Vulnerabilities

Foxit Software released security updates on February 3 2026 that remediate two moderate‑severity cross‑site scripting (XSS) vulnerabilities (CVE‑2026‑1591, CVE‑2026‑1592) in Foxit PDF Editor Cloud, and a related XSS flaw (CVE‑2025‑66523) in Foxit eSign patched on January 15 2026. The flaws allowed crafted file attachment...

By The Cyber Express
Global Threat Map: Open-Source Real-Time Situational Awareness Platform
NewsFeb 4, 2026

Global Threat Map: Open-Source Real-Time Situational Awareness Platform

Global Threat Map is an open‑source platform that aggregates multiple public threat‑intelligence feeds into a live, animated world map showing malware, phishing, botnet and other malicious activity. The project publishes its data‑collection code on GitHub, offering full transparency of sources...

By Help Net Security
How Secure by Design Helps Developers Build Secure Software
NewsFeb 4, 2026

How Secure by Design Helps Developers Build Secure Software

The Center for Internet Security and SAFECode have published "Secure by Design: A Guide to Assessing Software Security Practices," a risk‑based manual that integrates security into every stage of the software development lifecycle. The guide aligns the NIST Secure Software...

By Help Net Security
One Identity Appoints Gihan Munasinghe as Chief Technology Officer
NewsFeb 4, 2026

One Identity Appoints Gihan Munasinghe as Chief Technology Officer

One Identity announced the appointment of Gihan Munasinghe as Chief Technology Officer. Munasinghe brings more than 15 years of experience leading global engineering organizations and modernising legacy platforms. He will steer the engineering team, accelerate the company’s SaaS delivery model...

By HackRead
Why Incident Response Breaks Down when It Matters Most
NewsFeb 4, 2026

Why Incident Response Breaks Down when It Matters Most

In a Help Net Security video, Jon David, Managing Director at NR Labs, explains why incident response often collapses during active breaches. He highlights that hesitation, poor escalation, and weak communication let attackers outpace defenders. The discussion emphasizes that trust,...

By Help Net Security
BGEANX and Scam: How Impersonation Confuses Crypto Users
NewsFeb 4, 2026

BGEANX and Scam: How Impersonation Confuses Crypto Users

Impersonators are hijacking the BGEANX brand to create fake platforms and phishing campaigns, misleading crypto users who mistake these copies for the legitimate service. The fraudulent sites copy visual elements, request private keys, and use urgency to exploit market emotions....

By TechBullion
Why Network Detection and Response Is the Missing Link in Financial Services Security
NewsFeb 4, 2026

Why Network Detection and Response Is the Missing Link in Financial Services Security

Financial services firms boast mature security stacks, yet breaches persist because attackers exploit blind spots in network visibility. Traditional defenses—firewalls, endpoint tools, and SIEMs—focus on perimeter and device events, missing lateral movement and encrypted traffic anomalies. Network Detection and Response...

By TechBullion
Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident
NewsFeb 4, 2026

Auto Finance Fraud Is Costing Dealers up to $20,000 per Incident

Auto dealers are facing a growing fraud problem that can cost up to $20,000 per incident, according to Experian research. The most common schemes involve income and employment misrepresentation, followed closely by synthetic and third‑party identity fraud. Fraud often surfaces...

By Help Net Security
Stablecoin ‘Dust’ Txs on Ethereum Triple Post-Fusaka: Coin Metrics
NewsFeb 4, 2026

Stablecoin ‘Dust’ Txs on Ethereum Triple Post-Fusaka: Coin Metrics

Coin Metrics reports that stablecoin dusting attacks now make up 11% of Ethereum transactions and 26% of active addresses, a sharp rise after the December Fusaka upgrade lowered gas costs. Daily transaction volume has surpassed 2 million, peaking near 2.9 million in...

By Cointelegraph
AU10TIX, Microsoft Partnership Reduces Reduces Fake Account Openings By 90%
NewsFeb 4, 2026

AU10TIX, Microsoft Partnership Reduces Reduces Fake Account Openings By 90%

AU10TIX and Microsoft unveiled OneVet, a joint solution that blends Azure Verifiable Credentials with AU10TIX’s AI‑driven identity intelligence. The platform automates partner account validation, delivering a 90% drop in fake account openings and cutting impersonation attempts. By issuing reusable, cryptographically...

By Crowdfund Insider
Wave of Citrix NetScaler Scans Use Thousands of Residential Proxies
NewsFeb 3, 2026

Wave of Citrix NetScaler Scans Use Thousands of Residential Proxies

GreyNoise observed a coordinated reconnaissance campaign against Citrix NetScaler from Jan 28 to Feb 2, leveraging over 63,000 residential proxy IPs and a single Azure address. The scans generated 111,834 sessions, with 79% targeting Citrix Gateway honeypots and 64% originating from residential...

By BleepingComputer
Socure Unveils Unified Risk Platform for Government Agencies
NewsFeb 3, 2026

Socure Unveils Unified Risk Platform for Government Agencies

Socure announced SocureGov RiskOS, a unified risk platform for government agencies to modernize digital identity verification. The solution merges Socure’s existing public‑sector offerings with new AI‑powered analytics, replacing fragmented legacy systems with a single ecosystem. It leverages behavioral analytics, device...

By PYMNTS
Adversarial Exposure Validation for Modern Environments
NewsFeb 3, 2026

Adversarial Exposure Validation for Modern Environments

Adversarial Exposure Validation (AEV) is a continuous, attacker‑style testing framework that proves whether identified exposures can actually be exploited in modern cloud and CI/CD environments. By combining automated PTaaS and BAS with human‑driven red‑team exercises and pipeline‑level validation, organizations receive...

By Security Boulevard
DataDome Integrates Bot Protection with Varnish Software’s New Sovereign CDN
NewsFeb 3, 2026

DataDome Integrates Bot Protection with Varnish Software’s New Sovereign CDN

Varnish Software launched Varnish CDN, a fully sovereign European content delivery network that keeps all traffic, data, and metadata within EU jurisdiction. DataDome integrated its AI‑powered bot and agent trust management directly into the CDN, delivering real‑time protection against scraping,...

By Security Boulevard
Mastering Enterprise IAM: Naveen Rudraradhya on Leading Global Identity and Access Transformation
NewsFeb 3, 2026

Mastering Enterprise IAM: Naveen Rudraradhya on Leading Global Identity and Access Transformation

Naveen Rudraradhya, an IAM veteran with an MBA in IT Business Management, led a global identity and access transformation that unified standards across regions while respecting local regulations. He replaced manual request channels with a single, automated portal linking HR...

By TechBullion
Deno Sandbox
NewsFeb 3, 2026

Deno Sandbox

Over the past year Deno Deploy customers have increasingly generated code with large language models that runs instantly, exposing API keys and network access. Deno now offers Sandbox, lightweight Linux microVMs that isolate untrusted code, enforce network‑egress policies, and keep...

By Hacker News
Iron Mountain: Data Breach Mostly Limited to Marketing Materials
NewsFeb 3, 2026

Iron Mountain: Data Breach Mostly Limited to Marketing Materials

Iron Mountain disclosed that the recent breach claimed by the Everest extortion gang was confined to a single folder of marketing materials on a public‑facing file‑sharing server. Attackers used a compromised login credential but did not deploy ransomware or access...

By BleepingComputer
SQL Injection Flaw Affects 40,000 WordPress Sites
NewsFeb 3, 2026

SQL Injection Flaw Affects 40,000 WordPress Sites

A SQL injection vulnerability (CVE‑2025‑67987) was found in the Quiz and Survey Master (QSM) WordPress plugin affecting versions up to 10.3.1. The flaw allowed any logged‑in user with Subscriber‑level access to inject arbitrary SQL via the `_is_linking_` REST API parameter,...

By Infosecurity Magazine