(Adobe Stock) VS Code config files abused to launch RCEs via GitHub CodespacesSteve ZurierFebruary 5, 2026Experts point out that exploited VS Code presents supply chain, credential theft, and network access risks.
Rebuilding reputation after a cybersecurity incident: Where trust is won backMeghan TisingerFebruary 4, 2026
From change prevention to continuous improvement: Automating patch cycles with guardrails, rings, and proofBill BrennerJanuary 6, 2026
Threat ManagementMore than 10,000 IPs hijacked by SystemBC botnetLaura FrenchFebruary 5, 2026Researchers identified continued development of the botnet despite “Operation Endgame” disruption.
Security OperationsInfostealer threats move beyond Windows to target macOS machinesSteve ZurierFebruary 4, 2026The infostealers leverage Python to deliver malware that steals credentials.
AI/MLOpenClaw agents targeted with 341 malicious ClawHub skillsLaura FrenchFebruary 4, 2026Most of the malicious skills deployed malware consistent with Atomic Stealer on Mac machines.
Security OperationsMicrosoft Office bugs exploited by Russia-linked APT28Steve ZurierFebruary 3, 2026Experts warn that social engineering lets attackers take advantage of even the lesser-rated vulnerabilities.
IdentityPDF phishing attack leads to stolen Dropbox credentialsLaura FrenchFebruary 2, 2026The attack uses seemingly benign attachments and trusted cloud infrastructure to evade detection.
Security OperationsGlassWorm malware targets Open VSX Registry in supply chain attackSteve ZurierFebruary 2, 2026Experts concerned the malware can spread throughout the open-source developer environment.
Security OperationsAI agents solve 9 of 10 web security CTF challenges in recent studyLaura FrenchJanuary 30, 2026The agents solved most challenges at low cost but struggled with more broadly scoped tasks.
Security OperationsIvanti patches two 9.8 bugs in Endpoint Manager MobileSteve ZurierJanuary 30, 2026CVE-2026-1281 and CVE-2026-1340 have CVSS scores of 9.8 and have already been exploited.