View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to take full control of the device. The following versions of Avation Light Engine Pro are affected: Light Engine Pro vers:all/* (CVE-2026-1341) CVSS Vendor Equipment Vulnerabilities v3 9.8…
Synectix LAN 232 TRIO
View CSAF Summary Successful exploitation of this vulnerability could result in an unauthenticated attacker modifying critical device settings or factory resetting the device. The following versions of Synectix LAN 232 TRIO are affected: LAN 232 TRIO vers:all/* (CVE-2026-1633) CVSS Vendor…
Foxit PDF Editor Vulnerabilities Let Attackers Execute Arbitrary JavaScript
Security updates addressing critical cross-site scripting (XSS) vulnerabilities in Foxit PDF Editor Cloud that could allow attackers to execute arbitrary JavaScript code in users’ browsers. The vulnerabilities were discovered in the application’s File Attachments list and Layers panel, where insufficient…
Hackers Exploiting React Native’s Metro Server in the Wild to Attack Developers
Threat actors are actively exploiting a critical remote code execution vulnerability in React Native’s Metro Development Server to deliver advanced malware payloads across Windows and Linux systems. VulnCheck’s Canary honeypot network first detected operational exploitation of CVE-2025-11953 dubbed “Metro4Shell” on…
An AI plush toy exposed thousands of private chats with children
Around 50,000 chat transcripts between children and Bondu’s AI dinosaur plushie were accessible to anyone with a Google account. This article has been indexed from Malwarebytes Read the original article: An AI plush toy exposed thousands of private chats with…
CISA updated ransomware intel on 59 bugs last year without telling defenders
GreyNoise’s Glenn Thorpe counts the cost of missed opportunities On 59 occasions throughout 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) silently tweaked vulnerability notices to reflect their use by ransomware crooks. Experts say that’s a problem.… This article…
French Police Raid X Paris Office, Summon Musk Over Grok Deepfakes
French authorities raided the Paris office of X and summonsed Elon Musk to France for question regarding nonconsensual and sexually suggestive deepfakes generated by xAI’s chatbot and posted to X as the global firestorm surrounding them escalates. The post French…
Security Is Shifting From Prevention to Resilience
Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset toward resilience and response. Cole traces his career from the early days of mass malware outbreaks like Melissa and ILOVEYOU…
Experts Find Malicious ClawHub Skills Stealing Data from OpenClaw
Koi Security’s security audit of 2,857 skills on ClawHub found 341 malicious skills via multiple campaigns. Users are exposed to new supply chain threats. ClawHub is a marketplace made to help OpenClaw users in finding and installing third-party skills. It…
CrossCurve Bridge Hit by $3 Million Exploit after Smart Contract Flaw
CrossCurve, a cross-chain bridge formerly known as EYWA, has suffered a major cyberattack after hackers exploited a vulnerability in its smart contract infrastructure, draining about $3 million across multiple blockchain networks. The CrossCurve team confirmed the incident on Sunday, saying…
French police search X office in Paris, summons Elon Musk for questioning
The Paris prosecutor’s office announced that it is expanding a criminal investigation into X for alleged crimes, including the possession and distribution of child sexual exploitation material. This article has been indexed from Security News | TechCrunch Read the original…
Practical Fraud Prevention
A hands-on guide to detecting, analyzing, and stopping online fraud without sacrificing customer experience. This article has been indexed from CyberMaterial Read the original article: Practical Fraud Prevention
Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts
Security researchers warn that the initial threat activity was highly targeted, as a limited number of users were impacted prior to disclosure. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Critical flaws in…
IT Security News Hourly Summary 2026-02-03 18h : 11 posts
11 posts were published in the last hour 16:34 : How deepfake scams are fueling a new wave of fraud 16:34 : Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure 16:34 : Using AI Agents…
How deepfake scams are fueling a new wave of fraud
Scammers are using deepfake technology to replicate your child’s voice in a kidnapping hoax, catfish with AI-generated video dates, and impersonate executives to steal millions. Learn how to spot deepfake fraud, and use Avast Deepfake Guard to help verify what’s…
Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
Hackers exploit a critical React Native CLI flaw (CVE-2025-11953) to run remote commands and drop stealthy Rust malware, weeks before public disclosure. Attackers are actively exploiting a critical flaw in the React Native CLI Metro server, tracked as CVE-2025-11953. The…
Using AI Agents to Separate Real Risk From Vulnerability Noise
Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of the most stubborn problems in security operations. Ben Shimol argues that the numbers are getting worse, not better. Exploitation has…
French Police Raid X Paris Office, Summons Musk Over Grok Deepfakes
French authorities raided the Paris office of X and summonsed Elon Musk to France for question regarding nonconsensual and sexually suggestive deepfakes generated by xAI’s chatbot and posted to X as the global firestorm surrounding them escalates. The post French…
SQL Injection Flaw Affects 40,000 WordPress Sites
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin This article has been indexed from www.infosecurity-magazine.com Read the original article: SQL Injection Flaw Affects 40,000 WordPress Sites
Hundreds of Malicious Crypto Trading Addons Found in Moltbot/OpenClaw
A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of Malicious Crypto Trading Addons Found in Moltbot/OpenClaw
PDFly Variant Uses Custom PyInstaller Modification, Forcing Analysts to Reverse-Engineer Decryption
A new variant of the PDFly malware has emerged with advanced techniques that challenge traditional analysis methods. The malware uses a modified PyInstaller executable that prevents standard extraction tools from working properly. This makes it difficult for security teams to…
Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
A sophisticated phishing campaign targeting macOS users has emerged, using fake compliance emails as a delivery mechanism for advanced malware. Chainbase Lab recently detected this campaign, which impersonates legitimate audit and compliance notifications to deceive users. The attack chain combines…
Stronger Incident Prevention Takes Just One CISO Decision
There is a comforting illusion in cybersecurity leadership: when things get noisy, you add more people. More analysts. More shifts. More headcount. It feels decisive. It looks responsible. It even photographs well for internal reports. But SOC inefficiency is rarely a…
RADICL Raises $31 Million for vSOC
The company will use the investment to accelerate development of its autonomous virtual security operations center (vSOC). The post RADICL Raises $31 Million for vSOC appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…