Latest Cybersecurity News and Articles


ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

05 February 2026
This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less visible while impact

The Buyer’s Guide to AI Usage Control

05 February 2026
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a widening

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

05 February 2026
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026. "The threat actor stopped maintaining its C2 servers on January 8 for the first time since we

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

05 February 2026
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect that

Epstein Files Leak Sensitive Data, Victim Information and Credentials

04 February 2026
Thousands of records released in relation to Jeffrey Epstein have been retracted due to inadequate redactions. 

Ransomware Damage To Cost The World $74B In 2026

04 February 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 4, 2026 –Read the full story Cybersecurity Ventures publishes a chart at RansomwareCost.com containing our calculations of global ransomware damage cost predictions from 2015 to 2031. For this year, 2026, we predict that The post Ransomware Damage To Cost The World $74B In 2026 appeared first on Cybercrime Magazine.

7 Data Breaches, Exposures to Know About (January 2026)

04 February 2026
7 data incidents that made headlines in January. 

What is Autonomous Penetration Testing and How Does it Work?

03 February 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 3, 2026 –Read the full story from BreachLock Everything you always wanted to know about penetration testing but were afraid to ask can be found in a widely popular blog post from BreachLock, a The post What is Autonomous Penetration Testing and How Does it Work? appeared first on Cybercrime Magazine.

Please Don’t Feed the Scattered Lapsus ShinyHunters

02 February 2026
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »

U.S. Secret Service Agents Recovered Nearly $1M For A 71-Year-Old Retiree

02 February 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 2, 2026 –Read the full story in Moneywise Cybercrime will cost the world more than $12 trillion annually by 2031, according to Cybersecurity Ventures, and most of that money will never The post U.S. Secret Service Agents Recovered Nearly $1M For A 71-Year-Old Retiree appeared first on Cybercrime Magazine.

Why should renters like me have to trade away our privacy just to get a roof over our heads? | Samantha Floreani

01 February 2026
Why should renters like me have to trade away our privacy just to get a roof over our heads? | Samantha Floreani The rise in real estate tech means renters often hand over huge amounts of revealing information to digital third parties – at great riskGet our breaking news email, free app or daily news podcastWould you trade your data privacy and security for housing? Thanks to the rise in real estate technologies, renters often have no choice but to hand over huge amounts of revealing information to digital third parties just to have somewhere to live. All the while we are told: trust us, we take your privacy seriously.But recent Guardian reporting has revealed that seven popular “rent-tech” platforms have serious security vulnerabilities, leaving millions of documents containing personal information of renters exposed on the open web for years. When they were alerted to the risk, only two of the seven companies responded to say they would put additional security measures in place. Is this what taking renter privacy seriously looks like? Continue reading...

Real estate agents in Australia using apps that leave millions of lease documents at risk, digital researcher says

01 February 2026
Real estate agents in Australia using apps that leave millions of lease documents at risk, digital researcher says Exclusive: ‘This is a blatant and disturbing disregard for the law and for people’s security,’ digital rights advocate saysFollow our Australia news live blog for latest updatesGet our breaking news email, free app or daily news podcastAustralian platforms used by real estate agents to upload documentation for renters and landlords are leaving people’s personal information exposed in hyperlinks accessible online.An analysis of seven rent platforms provided to Guardian Australia by a researcher, who wished to remain anonymous, revealed millions of leasing documents could be accessed by threat actors. Continue reading...

Cybersecurity Predictions for 2026

30 January 2026
Six Predictions for the AI-Driven SOC – Subo Guha, Senior Vice President, Product Management, Stellar Cyber San Jose, Calif. – Jan. 30, 2026 Agentic AI as applied to the cybersecurity market is expected to grow from $738.2 million in 2024 to an estimated $1.73 billion The post Cybersecurity Predictions for 2026 appeared first on Cybercrime Magazine.

Is Renewing CISA Enough to Restore Confidence for Cyber Threat Reporters?

30 January 2026
Stop-and-go authorizations undermine real-time threat sharing. 

Orca Security Co-Founder & CEO Gil Geron: Cloud Security Pioneer

30 January 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 30, 2026 –Watch the YouTube video 2026 is here, and the cloud security landscape is shifting rapidly. AI is reshaping how attackers operate, supply chains remain under siege, and the definition of The post Orca Security Co-Founder & CEO Gil Geron: Cloud Security Pioneer appeared first on Cybercrime Magazine.

The Mob Museum, Las Vegas: Explore the Past, Present and Future of Cybercrime

29 January 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 29, 2026 –Watch the YouTube video The Mob Museum’s timely new exhibit “Digital Underworld” explores the rise of cybercrime as the newest frontier of organized crime, and it’s captured in a new The post The Mob Museum, Las Vegas: Explore the Past, Present and Future of Cybercrime appeared first on Cybercrime Magazine.

Burner phones and lead-lined bags: a history of UK security tactics in China

28 January 2026
Burner phones and lead-lined bags: a history of UK security tactics in China Starmer’s team is wary of spies but such fears are not new – with Theresa May once warned to get dressed under a duvetWhen prime ministers travel to China, heightened security arrangements are a given – as is the quiet game of cat and mouse that takes place behind the scenes as each country tests out each other’s tradecraft and capabilities.Keir Starmer’s team has been issued with burner phones and fresh sim cards, and is using temporary email addresses, to prevent devices being loaded with spyware or UK government servers being hacked into. Continue reading...

77% of Financial Service Organizations Accrued Security Debt in 2025

28 January 2026
Financial service organizations accrue security debt.

CISO Salaries Continue to Rise Despite Economic Uncertainty

28 January 2026
CISO salaries rise despite economic concerns.

RSAC 2026—Where The World Talks Security

27 January 2026
What founders and CEOs are saying about this year’s conference Register – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Jan. 27, 2026 For 35 years, RSAC has been a driving force behind the world’s cybersecurity community. The power of community is a key focus for the The post RSAC 2026—Where The World Talks Security appeared first on Cybercrime Magazine.