An alleged ransomware attack has taken down the systems of the Sapienza University of Rome. This article has been indexed from Security News | TechCrunch Read the original article: One of Europe’s largest universities knocked offline for days after cyberattack
Top 19 contact center platforms of 2026
<p>Contact center software has existed since the dawn of digital contact centers decades ago. But, in recent years, the contact center software industry has changed significantly.</p> <p>New technologies, such as generative AI, have spawned powerful and innovative contact center features.…
Keeper Security Announces 2026 MSP Partner Program
Keeper Security has announced the launch of its 2026 Managed Service Provider (MSP) Partner Program. The program helps managed service providers to deliver enterprise-grade privileged access management while growing their recurring revenue. This new launch is aligned with Keeper’s strategy…
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it’s part of…
Hitachi Energy XMC20
View CSAF Summary Hitachi Energy is aware of a vulnerability that affects XMC20 product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product.…
o6 Automation GmbH Open62541
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition and memory corruption. The following versions of o6 Automation GmbH Open62541 are affected: Open62541 >=1.5-rc1|<1.5-rc2 (CVE-2026-1301) CVSS Vendor Equipment Vulnerabilities v3 5.7 o6…
Hitachi Energy FOX61x
View CSAF Summary Hitachi Energy is aware of a vulnerability that affects FOX61x product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product.…
Mitsubishi Electric MELSEC iQ-R Series
View CSAF Summary Successful exploitation of this vulnerability may allow an attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial-of-service condition on the…
TP-Link Systems Inc. VIGI Series IP Camera
View CSAF Summary Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras. The following versions of TP-Link Systems Inc. VIGI Series IP Camera are affected: VIGI Cx45 Series Models C345,…
Salt Security warns autonomous AI agents are the next major security blind spot
Experiments involving autonomous AI agents coordinating, sharing code and acting without human supervision have captured plenty of attention in recent weeks. Platforms such as Moltbook and tools like Clawdbot have been framed as glimpses into a future where AI systems…
Threat Group Running Espionage Operations Against Dozens of Governments
Unit 42 researchers say an Asian threat group behind what they call the Shadow Campaigns has targeted government agencies in 37 countries in a wide-ranging global cyberespionage campaign that has involved phishing attacks and the exploitation of a more than…
The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
Most security incidents happen in the gap between knowing what matters and actually implementing security controls consistently. Read how Microsoft is helping organizations close this implementation gap. The post The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD…
OpenClaw and the Growing Security Risks of Agentic AI
OpenClaw’s rise shows how agentic AI can expand attack surfaces and introduce new enterprise security risks. The post OpenClaw and the Growing Security Risks of Agentic AI appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
AI and Regulation Redefine Application Security, New Global Study Finds
Artificial intelligence has overtaken all other forces shaping application security, according to a major new industry study that shows organisations racing to secure AI-generated code while responding to growing regulatory pressure. The 16th edition of the Building Security In Maturity…
Attackers Use Legitimate Forensic Driver to Disable Endpoint Security, Huntress Warns
Cybercriminals are increasingly turning trusted software against defenders, according to new research from Huntress, which has uncovered a real-world attack in which threat actors used a legitimate but vulnerable driver to disable endpoint security tools before deploying further malicious activity.…
Proton Warns European Startups: No One Is Too Small to Be Targeted by Hackers
Swiss privacy company Proton is urging European startups to rethink their cybersecurity approach after new research based on dark-web breach monitoring found that early-stage companies are increasingly targeted by cybercriminals, with significant consequences for innovation, data protection, and business continuity.…
Harlan Parrott Appointed as KnowBe4’s VP of AI Innovation
KnowBe4 has announced the appointment of Harlan Parrott as VP of AI Innovation, following the company’s 10-year anniversary celebration of pioneering Artificial Intelligence (AI) in cybersecurity. As VP, Parrott will lead the AI Center of Excellence by overseeing the company’s…
Orchid Security Adds Ability to Audit Behaviors by Identity
Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data…
Experts Find Malicious Browser Extensions, Chrome, Safari, and Edge Affected
Threat actors exploit extensions Cybersecurity experts found 17 extensions for Chrome, Edge, and Firefox browsers which track user’s internet activity and install backdoors for access. The extensions were downloaded over 840,000 times. The campaign is not new. LayerX claimed that…
China-Linked Hackers Step Up Quiet Spying Across South-East Asia
Threat actors linked to China have been blamed for a new wave of cyber-espionage campaigns targeting government and law-enforcement agencies across South-East Asia during 2025, according several media reports. Researchers at Check Point Research said they are tracking a previously…
Smart Homes Under Threat: How to Reduce the Risk of IoT Device Hacking
Most households today use some form of internet of things (IoT) technology, whether it’s a smartphone, tablet, smart plugs, or a network of cameras and sensors. Learning that nearly 120,000 home security cameras were compromised in South Korea and…
Tactical Wireless Security
A hands-on guide to testing wireless defenses, mastering SDR, and understanding modern RF attack techniques. This article has been indexed from CyberMaterial Read the original article: Tactical Wireless Security
IT Security News Hourly Summary 2026-02-05 18h : 7 posts
7 posts were published in the last hour 16:36 : Wordfence Intelligence Weekly WordPress Vulnerability Report (January 26, 2026 to February 1, 2026) 16:36 : Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics 16:35 : 170+…
Wordfence Intelligence Weekly WordPress Vulnerability Report (January 26, 2026 to February 1, 2026)
📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnerability, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find…