• Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

    Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. “It provides a single place to block current and future generative AI features in Firefox,” Ajit Varma, head of Firefox, said. “You can also review and manage individual AI…

  • Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

    A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7. The development comes shortly…

  • Attackers Harvest Dropbox Logins Via Fake PDF Lures

    A malware-free phishing campaign targets corporate inboxes and asks employees to view “request orders,” ultimately leading to Dropbox credential theft. ​ ​ ​Read More

  • County Pays $600K to Wrongfully Jailed Pen Testers

    Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises. ​ ​ ​Read More

  • Chinese Hackers Hijack Notepad++ Updates for 6 Months

    State-sponsored threat actors compromised the popular code editor’s hosting provider to redirect targeted users to malicious downloads. ​ ​ ​Read More

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

    The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. “Malicious updates were distributed through eScan’s legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise ​ ​ ​Read More

  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

    Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users. “On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed…

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

    A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It’s said to coincide with the nationwide unrest in Iran that began towards the…

  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

    Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim ​ ​ ​Read More

  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

    CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29,…