Application securityAnthropic: Latest Claude model finds more than 500 vulnerabilitiesLaura FrenchFebruary 6, 2026The AI company says all bugs were validated by human researchers to weed out false positives.
Governance, Risk and ComplianceCISA gives federal agencies one year to replace outdated edge devicesSteve ZurierFebruary 6, 2026Experts agree that it’s time for the federal government replace antiquated network infrastructure.
Vulnerability ManagementGoogle patches RCE, internal database leak flaws in LookerLaura FrenchFebruary 6, 2026Researchers used a crafted Git repo and exploited a race condition to achieve RCE.
Application securityVS Code config files abused to launch RCEs via GitHub CodespacesSteve ZurierFebruary 5, 2026Experts point out that exploited VS Code presents supply chain, credential theft, and network access risks.
Threat ManagementMore than 10,000 IPs hijacked by SystemBC botnetLaura FrenchFebruary 5, 2026Researchers identified continued development of the botnet despite “Operation Endgame” disruption.
Security OperationsInfostealer threats move beyond Windows to target macOS machinesSteve ZurierFebruary 4, 2026The infostealers leverage Python to deliver malware that steals credentials.
AI/MLOpenClaw agents targeted with 341 malicious ClawHub skillsLaura FrenchFebruary 4, 2026Most of the malicious skills deployed malware consistent with Atomic Stealer on Mac machines.
Security OperationsMicrosoft Office bugs exploited by Russia-linked APT28Steve ZurierFebruary 3, 2026Experts warn that social engineering lets attackers take advantage of even the lesser-rated vulnerabilities.
IdentityPDF phishing attack leads to stolen Dropbox credentialsLaura FrenchFebruary 2, 2026The attack uses seemingly benign attachments and trusted cloud infrastructure to evade detection.
Security OperationsGlassWorm malware targets Open VSX Registry in supply chain attackSteve ZurierFebruary 2, 2026Experts concerned the malware can spread throughout the open-source developer environment.
The Trump administration’s recent OMB memo walks back important Secure-by-Design conceptsTim MackeyFebruary 6, 2026