Archive for the Uncategorized Category

By Ionut Arghire

Vulnerable SolarWinds Web Help Desk instances were exploited in December 2025 for initial access.

The post Recent SolarWinds Flaws Potentially Exploited as Zero-Days appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

The European Commission’s ruling is based on extensive feedback from customers and rival cloud security and infrastructure vendors.

The post EU Unconditionally Approves Google’s $32B Acquisition of Wiz appeared first on SecurityWeek.

…read more

Source:: securityweek

By Associated Press

Officials said data will now be classified as one of four categories: “public,” “sensitive,” “confidential” or “restricted.”

The post Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack appeared first on SecurityWeek.

…read more

Source:: securityweek

Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.

…read more

Source:: Security magazin

By Kevin Townsend

New research shows attackers increasingly abusing APIs at machine speed as AI-driven systems widen exposure and amplify impact.

The post API Threats Grow in Scale as AI Expands the Blast Radius appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

CISA updated 59 KEV entries in 2025 to specify that the vulnerabilities have been exploited in ransomware attacks.

The post Questions Raised Over CISA’s Silent Ransomware Updates in KEV Catalog appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

Significant cybersecurity M&A deals announced by CrowdStrike, Infoblox, JumpCloud, LevelBlue, OneSpan, and Radware.

The post Cybersecurity M&A Roundup: 34 Deals Announced in January 2026 appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

The company has fixed several critical vulnerabilities that can be exploited for arbitrary code execution.

The post Patch Tuesday: Adobe Fixes 44 Vulnerabilities in Creative Apps appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Impacting the ‘dyld’ system component, the memory corruption issue can be exploited for arbitrary code execution.

The post Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’ appeared first on SecurityWeek.

…read more

Source:: securityweek

The six-phase playbook of how romance scams actually work.

…read more

Source:: Security magazin