Tuesday, February 10, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
A Patched Flaw Still Opening Doors: Inside the WinRAR Exploit Surge
February 06, 2026
Months after it was patched, a path traversal flaw in WinRAR (CVE-2025-8088) is still being actively exploited, according to Google’s Threat Intelligence Group. The vulnerability was fixed in July 2025, but many users haven’t updated,…
Read More >
Fake LinkedIn “Policy Violation” Comments Turn Public Posts into Phishing Traps
February 05, 2026
A recent phishing campaign has arisen targeting users on LinkedIn in public post comments. This demonstrates attackers shifting away from DMs and email as initial attack vectors and toward highly visible spaces where users feel…
Read More >
Infected Android Devices Are Powering a Global DDoS Army
February 03, 2026
A massive, sprawling DDoS and proxy botnet, known as Kimwolf, has recently shown increased activity, growing to more than two million infected devices since August 2025. These millions of Android devices are globally distributed and…
Read More >
The Cloud Complexity Gap Is Becoming an AI Security Liability
February 02, 2026
A new report from Fortinet and Cybersecurity Insiders outlines growing tension between the pace of AI-driven cloud adoption and the capacity of current security models to keep up. The 2026 Cloud Security Report highlights how…
Read More >
How a Broadcom Wi-Fi Flaw Exposes a Fragile Wireless Reality
February 02, 2026
Wireless networks are often treated as invisible utilities by organizations and individuals alike—expected to work continuously, silently, and flawlessly. Unfortunately, this assumption is not always true, as demonstrated in a recent publication based on a…
Read More >
Critical Veeam Remote Code Execution Attack Highlights Risk of Trusted Backup Access
January 29, 2026
Shortly after the New Year, Veeam disclosed a critical Remote Code Execution (RCE) vulnerability in its backup and replication software. This underscores a familiar but uncomfortable reality in enterprise security: The most dangerous attacks often don’t…
Read More >
North Korea’s Kimsuky Turns to “Quishing” Against U.S. Organizations
January 27, 2026
The United States Federal Bureau of Investigation (FBI) has released a FLASH alert warning about evolving techniques in campaigns by the North Korean state-sponsored threat group known as Kimsuky. The alert reveals an evolution in…
Read More >
Why Government Is Rethinking Cybersecurity as a System, Not a Silo
January 26, 2026
The UK government has published a new Government Cyber Action Plan backed by £210 million in funding, setting out a coordinated strategy to address cybersecurity risks across the public sector. Framed as a response to…
Read More >
Inside the ClickFix Campaign Targeting Hospitality
January 23, 2026
Phishing is one of the oldest social engineering tricks in a threat actor’s playbook, a tried-and-true technique that continues to pay out as attacks and defenses advance over time. Rather than stagnating in the face…
Read More >
How Attackers Are Abusing Google Cloud to Evade Email Security
January 20, 2026
Phishing is one of the tried-and-true methods that attackers have been heavily relying on since the early days of the internet, but it is far from a stagnant technique. Over the years, phishing has grown…
Read More >
Why Security Controls Are Collapsing Under Their Own Weight
January 20, 2026
A new report from CyberArk paints a stark picture: while organizations say they’re modernizing, their security models haven’t kept up. According to The Privilege Reality Gap, the divide between perception and reality in privileged access…
Read More >
Zero-Knowledge Biometrics and the New Rules of Digital Trust in the Age of AI
January 19, 2026
In recent years, the growth of AI tools has fundamentally altered the economics of identity fraud. Deepfakes, synthetic identities, and automated phishing are now able to scale faster than traditional defenses, amplifying threats and shifting…
Read More >
CISA Sounds the Alarm on Actively Exploited GeoServer Flaw
January 19, 2026
The United States Cybersecurity and Infrastructure Security Agency (CISA) has added a new Known Exploited Vulnerability (KEV) and put out a binding operational directive for all Federal Civilian Executive Branch (FCEB) agencies to patch the…
Read More >
AI Didn’t Eliminate Burnout—It Changed Its Shape
January 13, 2026
While the growing use of AI in business environments can be largely successful at eliminating repetitive work and alleviating traditional sources of burnout, it also introduces new complexities and fails to reduce overall stress. A…
Read More >
Cisco Zero-Day Exposes a Dangerous Blind Spot
January 12, 2026
Leading technology company Cisco has disclosed a zero-day vulnerability being exploited in a new campaign. The flaw, tracked as CVE-2025-20393, affects multiple widely-used products running Cisco AsyncOS Software: Cisco Secure Email Gateway, Secure Email, and…
Read More >
How a Firewall Zero-Day Turned a Vendor Breach Into a Banking-Sector Event
January 09, 2026
A routine breach notification filed with the Maine Attorney General reveals an event with far-reaching consequences: a ransomware attack on Marquis Software Solutions, a third-party provider for U.S. banks and credit unions, compromised sensitive customer…
Read More >
When Legitimate Tools Become Perfect Backdoors
January 09, 2026
The modern threat landscape shows developments in attack tactics that change the scope of what attackers can do with various tools. Recent advances have demonstrated that threat actors no longer need custom malware to establish…
Read More >
Cybersecurity’s Budget Boom Signals a Strategic Reset for the Enterprise
January 06, 2026
Leading accounting firm KPMG recently released the 2025 KPMG Cybersecurity Survey, demonstrating the current trends in cybersecurity spending based on a poll of over 300 C-suite and senior security leaders. The survey shows nearly universal…
Read More >
Subscribe for the Latest News
"
*
" indicates required fields
Phone
This field is for validation purposes and should be left unchanged.
First Name
*
Last Name
*
Company Name
*
Job Title
*
Email
*
Country
*
Country *
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cambodia
Cameroon
Canada
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos Islands
Colombia
Comoros
Congo
Congo, Democratic Republic of the
Cook Islands
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Côte d'Ivoire
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine, State of
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Sweden
Switzerland
Syria Arab Republic
Taiwan
Tajikistan
Tanzania, the United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkmenistan
Turks and Caicos Islands
Tuvalu
Türkiye
US Minor Outlying Islands
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Åland Islands
Employee Count
*
Employee Count *
< 100 employees
100 to 249 employees
250 to 499 employees
500 to 999 employees
1,000 to 2,499 employees
2,500 to 4,999 employees
5,000 to 9,999 employees
10,000 to 24,999 employees
25,000+ employees
Industry
*
Industry *
Advertising & Marketing
Agriculture
Airlines & Aerospace (including Defense)
Automotive
Business Support & Logistics
Construction, Machinery and Homes
Education
Entertainment & Leisure
Finance & Financial Services
Food & Beverages
Government
Health Care & Pharmaceuticals
Insurance
Manufacturing
Nonprofit
Real Estate
Retail & Consumer Durables
Telecommunications, Technology, Internet & Electronics
Utilities, Energy, and Extraction
Other
Consent
*
I have read and agree to the Security Buzz
Privacy Policy
and understand that I may receive communications from Security Buzz and its partners by submitting this form.
*
CAPTCHA
Webinars
Tuesday, Feb. 10
1pm ET / 10am PT
Data Security Breakdown: Blind Spots, Breaches, and Missed Signals
Tuesday, Feb. 17
8am ET / 5am PT
Cybersecurity Predictions for 2026: Embracing the Risk-First Era
Tuesday, Feb. 17
1pm ET / 10am PT
Cybersecurity Predictions for 2026: Embracing the Risk-First Era