CISA Orders Federal Agencies to Replace End-of-Support Edge Devices Within 18 Months to Reduce Cyber Intrusion Risks

78/69 Monday, February 9, 2026 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive 26-02, instructing Federal Civilian Executive Branch (FCEB) agencies to strengthen the management of edge network devices. Agencies are required to identify and replace devices that have reached end-of-support status within 12 to 18 months to reduce cybersecurity […]

sittisak mintaboon

February 9, 2026

Italy’s La Sapienza University Goes Offline Following Cyberattack

77/69 Monday, February 9, 2026 La Sapienza University in Rome, Italy, remains unable to fully restore its IT services after suffering a cyberattack on February 2, causing widespread operational disruptions. Students have been unable to book exams, verify tuition payments, or access faculty contact information. The university has primarily communicated updates through social media and […]

sittisak mintaboon

February 9, 2026

Shadow Campaigns: APT Espionage Operation Targets 155 Countries Worldwide

76/69 Monday, February 9, 2026 Unit 42 from Palo Alto Networks has revealed the discovery of a state-sponsored threat group tracked as TGR-STA-1030 (also known as UNC6619), believed to be operating from Asia. The group is responsible for a large-scale cyber espionage initiative dubbed “Shadow Campaigns,” primarily aimed at stealing strategic, economic, and political intelligence […]

sittisak mintaboon

February 9, 2026

Microsoft Warns Infostealer Malware Is Spreading to macOS, Using Python and Malvertising to Steal iCloud Keychain Data

75/69 Friday, February 6, 2026 Microsoft Defender security researchers have warned of a growing trend in infostealer malware targeting the macOS operating system. Attackers are leveraging Python to develop cross-platform malware and employing social engineering techniques such as ClickFix, along with malvertising campaigns on Google Ads, to trick users into downloading fake installers. Once installed, […]

sittisak mintaboon

February 6, 2026

CISA Warns VMware ESXi Vulnerability Is Being Exploited in Ransomware Campaigns

74/69 Friday, February 6, 2026 CISA has disclosed that ransomware groups have begun exploiting a VMware ESXi vulnerability related to virtual machine sandbox escape. The flaw, tracked as CVE-2025-22225, was previously used in zero-day attacks and is classified as an arbitrary write vulnerability that could allow attackers with privileges inside the VMX process to write […]

sittisak mintaboon

February 6, 2026

Cyberattack Campaign Targets NGINX Servers, Aiming at Government and Educational Websites Across Asia

73/69 Friday, February 6, 2026 Researchers from DataDog Security Labs have discovered a cyberattack campaign targeting NGINX servers, a widely used web traffic management software. Threat actors modify configuration files to secretly install redirect commands, routing user data through hacker-controlled infrastructure before forwarding it to the legitimate destination. The campaign primarily targets websites using Asian […]

sittisak mintaboon

February 6, 2026
1 9 10