In an era where AI assistants like ChatGPT and Claude dominate cloud infrastructures, exposing user data to remote breaches, a new Rust-based tool called LocalGPT promises a fortress-like alternative. Developed as a single ~27MB binary, LocalGPT runs entirely on local…
Tag: Cyber Security News
Microsoft Data Center Power Outage Disrupts Windows 11 Updates and Store Functionality
Microsoft has confirmed that a significant power outage at one of its West US data centers triggered widespread service disruptions yesterday, leaving thousands of Windows 11 users unable to access the Microsoft Store or complete Windows Updates. The incident, which…
BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages
BridgePay Network Solutions, a major U.S. payment gateway provider, confirmed a ransomware attack caused a widespread outage, disrupting card processing for merchants nationwide. The outage began early on February 6, 2026, around 3:29 a.m. EST with degraded performance in systems…
Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists
Germany’s top security agencies issued an urgent warning yesterday regarding a sophisticated cyber espionage campaign targeting high-ranking officials and journalists across Europe. The Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI)…
BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution
BeyondTrust has disclosed a critical pre-authentication remote code execution vulnerability affecting its Remote Support (RS) and Privileged Remote Access (PRA) platforms, potentially exposing thousands of organizations to system compromise. The flaw, tracked as CVE-2026-1731 and classified under CWE-78 (OS Command…
OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace
OpenClaw announced today a partnership with VirusTotal, Google’s threat intelligence platform, to implement automated security scanning for all skills published to ClawHub, its AI agent marketplace. The integration marks the first comprehensive security initiative for the emerging AI agent ecosystem.…
OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner
OpenClaw v2026.2.6 enhances security in response to growing concerns about malicious skills within its ecosystem. This release features a code safety scanner and model support while addressing recent vulnerabilities highlighted by researchers. OpenClaw, an open-source framework for local AI agents…
Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data
Digital squatting has evolved from a simple trademark nuisance into a dangerous cybersecurity threat. In 2025, the World Intellectual Property Organization (WIPO) handled a record-breaking 6,200 domain disputes. This represents a 68% increase since 2020. Security experts warn that criminal…
nmapUnleashed Makes Nmap Scanning More Comfortable and Effective
nmapUnleashed emerges as a powerful CLI wrapper enhancing Nmap’s capabilities for penetration testers and network auditors. Released in late January 2026 by developer Sharkeonix, this open-source tool streamlines complex scans while retaining full Nmap compatibility. nmapUnleashed, or “nu,” wraps Nmap…
Claude Opus 4.6 Released with Improved Cybersecurity, Validating 500+ high-severity Vulnerabilities
Anthropic’s latest AI model autonomously identifies critical flaws in decades-old codebases, raising the stakes for both defenders and attackers Anthropic released Claude Opus 4.6 on February 5, 2026, with dramatically enhanced cybersecurity capabilities that have already identified more than 500…
Transparent Tribe Hacker Group Attacking India’s Startup Ecosystem
The threat landscape for India’s technology sector has taken an unexpected turn. A Pakistan-based hacking group called Transparent Tribe has shifted its focus from traditional government targets to the country’s vibrant startup ecosystem, particularly companies working in cybersecurity and intelligence…
New FvncBot Attacking Android Users by Exploiting Accessibility Services
A dangerous new malicious application has surfaced, targeting mobile banking customers in Poland. Observed on November 25, 2025, this threat masquerades as a legitimate security tool purportedly from mBank, a major Polish financial institution. The application serves as a gateway…
Bulletproof Hosting Providers Leverage Legitimate ISPsystem to Supply Servers for Cybercriminals
In the constantly shifting landscape of online threats, cybercriminals have found a new way to strengthen their attacks by hiding behind legitimate technology. Late in 2025, a series of ransomware incidents revealed that attackers were using virtual machines provisioned through…
CISA Orders Removal of Unsupported Active Network Edge Devices to Reduce Security Risks
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks. This directive, developed in coordination with the Office of Management and Budget (OMB), addresses…
New Wave of Odyssey Stealer Actively Targeting macOS Users
A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems. This fresh wave of cyber threats has caught the attention of security experts due to its rapid spread and enhanced stealth capabilities.…
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
Cracked game installers are again being used as a delivery channel for credential theft, but the latest wave adds an unusual twist: the malicious code hides behind a Ren’Py game launcher. The loader, now tracked as RenEngine, arrives bundled with…
China-Nexus Hackers Hijacking Linux-Based Devices to Manipulate Traffic and Deploy Malware
A sophisticated surveillance and attack framework dubbed “DKnife” has recently emerged, posing a significant threat to network security. Attributed to China-nexus threat actors, this malicious toolset specifically targets Linux-based routers and edge devices. By compromising these critical network gateways, attackers…
CISA Orders Removal of Active Network Edge Devices to Reduce Security Risks
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks. This directive, developed in coordination with the Office of Management and Budget (OMB), addresses…
Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise
Modern web applications frequently introduce unforeseen attack surfaces through seemingly harmless features designed for user engagement, such as newsletter signups, contact forms, and password resets. While individual vulnerabilities might appear manageable in isolation, sophisticated adversaries increasingly chain these minor flaws…
Flickr Confirms Data Breach – 35 million Users Data at Risk
Flickr has disclosed a potential data breach stemming from a vulnerability in a third-party email service provider’s system. The incident, reported on February 5, 2026, may have exposed data for some of its 35 million monthly users, though the exact…