Skip to content
February 2026 Page 4

February 2026

Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

Ravie LakshmananFeb 02, 2026Hacking News / Cybersecurity Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.… 

Securing the Mid-Market Across the Complete Threat Lifecycle

Securing the Mid-Market Across the Complete Threat Lifecycle

The Hacker NewsFeb 02, 2026Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that… 

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Ravie LakshmananFeb 02, 2026Threat Intelligence / Malware The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead. “The attack involved [an] infrastructure-level compromise… 

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. “Malicious updates were… 

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Ravie LakshmananFeb 02, 2026Developer Tools / Malware Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious…