- New tool blocks imposter attacks disguised as safe commandsby Bill Toulas on February 8, 2026 at 3:26 pm
A new open-source and cross-platform tool called Tirith can detect homoglyph attacks over command-line environments by analyzing URLs in typed commands and stopping their execution. […]
- State actor targets 155 countries in ‘Shadow Campaigns’ espionage opby Bill Toulas on February 7, 2026 at 3:09 pm
A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation dubbed the “Shadow Campaigns,” where it targeted government infrastructure in 155 countries. […]
- Payments platform BridgePay confirms ransomware attack behind outageby Ax Sharma on February 7, 2026 at 9:47 am
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay’s platform. […]
- Germany warns of Signal account hijacking targeting senior figuresby Bill Toulas on February 6, 2026 at 8:00 pm
Germany’s domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. […]
- DKnife Linux toolkit hijacks router traffic to spy, deliver malwareby Bill Toulas on February 6, 2026 at 6:35 pm
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns. […]
- CISA warns of SmarterMail RCE flaw used in ransomware attacksby Bill Toulas on February 6, 2026 at 5:16 pm
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. […]
- EDR, Email, and SASE Miss This Entire Class of Browser Attacksby Sponsored by Keep Aware on February 6, 2026 at 3:01 pm
Many modern attacks happen entirely inside the browser, leaving little evidence for traditional security tools. Keep Aware shows why EDR, email, and SASE miss browser-only attacks and how visibility changes prevention. […]
- EU says TikTok faces large fine over “addictive design”by Sergiu Gatlan on February 6, 2026 at 1:53 pm
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching the EU’s Digital Services Act (DSA). […]
- Man pleads guilty to hacking nearly 600 women’s Snapchat accountsby Sergiu Gatlan on February 6, 2026 at 12:34 pm
An Illinois man pleaded guilty to hacking nearly 600 women’s Snapchat accounts to steal nude photos that he kept, sold, or traded online, including accounts he compromised at the request of a former university track coach who was later convicted of sextortion. […]
- Flickr discloses potential data breach exposing users’ names, emailsby Sergiu Gatlan on February 6, 2026 at 9:43 am
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed their real names, email addresses, IP addresses, and account activity. […]
- CISA orders federal agencies to replace end-of-life edge devicesby Sergiu Gatlan on February 6, 2026 at 8:41 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive security updates from manufacturers. […]
- Spain’s Ministry of Science shuts down systems after breach claimsby Bill Toulas on February 5, 2026 at 9:23 pm
Spain’s Ministry of Science (Ministerio de Ciencia) announced a partial shutdown of its IT systems, affecting several citizen- and company-facing services. […]
- Ransomware gang uses ISPsystem VMs for stealthy payload deliveryby Bill Toulas on February 5, 2026 at 8:57 pm
Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider. […]
Bleeping Computer Cyber Security
We are an ethical website cyber security team and we perform security assessments to protect our clients.





