Breaking News – Cyber Threats (last 6h)
Generated: 2026-02-09 07:00 PST
- BeyondTrust warns of critical RCE flaw in remote support software
BleepingComputer • 2026-02-09 05:07 • www.bleepingcomputer.com
BeyondTrust warned customers to patch a critical security flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software that could allow unauthenticated attackers to execute arbitrary code remotely. […]
https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/ - ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More
The Hacker News • 2026-02-09 04:59 • thehackernews.com
Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths.
A clear pattern this week: attackers are abusing trust. Trusted updates, trusted marketplaces, trusted apps, even
https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html - LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days
Schneier on Security • 2026-02-09 04:04 • www.schneier.comThis is amazing:
Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability discovery for years, investing heavily in fuzzing infrastructure and custom harnesses to find bugs at scale. But what stood out in early testing is how quickly Opus 4.6 found vulnerabilities out of the box without task-specific tooling, custom scaffolding, or specialized prompting. Even more interesting is how it fou…
https://www.schneier.com/blog/archives/2026/02/llms-are-getting-a-lot-better-and-faster-at-finding-and-exploiting-zero-days.html - ISC Stormcast For Monday, February 9th, 2026 https://isc.sans.edu/podcastdetail/9800, (Mon, Feb 9th)
SANS ISC Diary (full) • 2026-02-09 03:47 • isc.sans.edu
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
https://isc.sans.edu/diary/rss/32694 - Men charged in FanDuel scheme fueled by thousands of stolen identities
BleepingComputer • 2026-02-09 03:41 • www.bleepingcomputer.com
Two Connecticut men face federal charges for allegedly defrauding FanDuel and other online gambling sites of $3 million over several years using the stolen identities of approximately 3,000 victims. […]
https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/ - Quick Howto: Extract URLs from RTF files, (Mon, Feb 9th)
SANS ISC Diary (full) • 2026-02-09 03:38 • isc.sans.eduMalicious RTF (Rich Text Format) documents are back in the news with the exploitation of CVE-2026-21509 by APT28.
- YARA-X 1.13.0 Release, (Mon, Feb 9th)
SANS ISC Diary (full) • 2026-02-09 03:37 • isc.sans.eduYARA-X's 1.13.0 release brings 4 improvements and 4 bugfixes.
- How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring
The Hacker News • 2026-02-09 03:23 • thehackernews.com
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool onto the workflow, but giving their teams faster, clearer
https://thehackernews.com/2026/02/how-top-cisos-solve-burnout-and-speed.html - Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
The Hacker News • 2026-02-09 02:58 • thehackernews.com
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT.
Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks against manufacturing, finance, and IT
https://thehackernews.com/2026/02/bloody-wolf-targets-uzbekistan-russia.html - Microsoft: Exchange Online flags legitimate emails as phishing
BleepingComputer • 2026-02-09 02:47 • www.bleepingcomputer.com
Microsoft is investigating an ongoing Exchange Online issue that mistakenly flags legitimate emails as phishing and quarantines them. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-online-flags-legitimate-emails-as-phishing/ - European Commission discloses breach that exposed staff data
BleepingComputer • 2026-02-09 01:49 • www.bleepingcomputer.com
The European Commission is investigating a breach after finding evidence that its mobile device management platform was hacked. […]
https://www.bleepingcomputer.com/news/security/european-commission-discloses-breach-that-exposed-staff-data/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
