Key Market Indicator:
F&G: 49
25.202,10 NASDAQ · 50.341,99 DOW · 6.967,16 S&P · 5.051,80 Gold · 68,55 BRENT

Proteo Defence 365/24/7 
Security Audits · CyberCrime Forensics · R/G/W Teaming
Powerful app-Suite for Admins, Website operators, Research

Switch View
Source: BleepingComputer Filter zurücksetzen
© Sector News
10.02.2026
Malicious 7-Zip site distributes installer laced with proxy tool
News Preview
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Microsoft releases Windows 10 KB5075912 extended security update
News Preview
Microsoft has released the Windows 10 KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
News Preview
Today is Microsoft's February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities. [...]
© BleepingComputer 2026
Worth to know
20.10.2025
Short Selling Radar

USA, Europe, Asia
Track Short Selling Activities worldwide
Knowing what matters
Short sale statistics, hedge fund activities and much more user-friendly information
© Sector News
10.02.2026
Windows 11 KB5077181 & KB5075941 cumulative updates released
News Preview
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]
© BleepingComputer 2026
Swarmalpha i/o · The Event Futures Prediction X
23.01.2026
© Sector News
10.02.2026
Volvo Group North America customer data exposed in Conduent hack
News Preview
Volvo Group North America disclosed that it suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Microsoft rolls out new Secure Boot certificates before June expiration
News Preview
Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Microsoft 365 outage takes down admin center in North America
News Preview
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
How to Automate AWS Incident Investigation with Tines and AI
News Preview
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual investigation work. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Microsoft announces new mobile-style Windows security controls
News Preview
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
ZeroDayRAT malware grants full access to Android, iOS devices
News Preview
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices. [...]
© BleepingComputer 2026
© Sector News
10.02.2026
Fugitive behind $73M 'pig butchering' scheme gets 20 years in prison
News Preview
A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or romance baiting) that defrauded victims of more than $73 million. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
Chinese cyberspies breach Singapore's four largest telcos
News Preview
The Chinese threat actor tracked as UNC3886 breached Singapore's four largest telecommunication service providers, Singtel, StarHub, M1, and Simba, at least once last year. [...]
© BleepingComputer 2026
Advertisment
20.10.2025
© Sector News
09.02.2026
Hackers exploit SolarWinds WHD flaws to deploy DFIR tool in attacks
News Preview
Hackers are now exploiting SolarWinds Web Help Desk (WHD) vulnerabilities to gain code execution rights on exposed systems and deploy legitimate tools, including the Velociraptor forensics tools, for persistence and remote control. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
Hackers breach SmarterTools network using flaw in its own software
News Preview
SmarterTools confirmed last week that the Warlock ransomware gang breached its network after compromising an email system, but did not impact business applications or account data. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
Password guessing without AI: How attackers build targeted wordlists
News Preview
Attackers don't need AI to crack passwords, they build targeted wordlists from an organization's own public language. This article explains how tools like CeWL turn websites into high-success password guesses and why complexity rules alone fall short. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
BeyondTrust warns of critical RCE flaw in remote support software
News Preview
BeyondTrust warned customers to patch a critical security flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software that could allow unauthenticated attackers to execute arbitrary code remotely. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
Men charged in FanDuel scheme fueled by thousands of stolen identities
News Preview
Two Connecticut men face federal charges for allegedly defrauding FanDuel and other online gambling sites of $3 million over several years using the stolen identities of approximately 3,000 victims. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
Microsoft: Exchange Online flags legitimate emails as phishing
News Preview
Microsoft is investigating an ongoing Exchange Online issue that mistakenly flags legitimate emails as phishing and quarantines them. [...]
© BleepingComputer 2026
© Sector News
09.02.2026
European Commission discloses breach that exposed staff data
News Preview
The European Commission is investigating a breach after finding evidence that its mobile device management platform was hacked. [...]
© BleepingComputer 2026
© Sector News
08.02.2026
New tool blocks imposter attacks disguised as safe commands
News Preview
A new open-source and cross-platform tool called Tirith can detect homoglyph attacks over command-line environments by analyzing URLs in typed commands and stopping their execution.  [...]
© BleepingComputer 2026
© Sector News
07.02.2026
State actor targets 155 countries in 'Shadow Campaigns' espionage op
News Preview
A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation dubbed the "Shadow Campaigns," where it targeted government infrastructure in 155 countries. [...]
© BleepingComputer 2026
© Sector News
07.02.2026
Payments platform BridgePay confirms ransomware attack behind outage
News Preview
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay's platform. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
Germany warns of Signal account hijacking targeting senior figures
News Preview
Germany's domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
DKnife Linux toolkit hijacks router traffic to spy, deliver malware
News Preview
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
CISA warns of SmarterMail RCE flaw used in ransomware attacks
News Preview
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
EDR, Email, and SASE Miss This Entire Class of Browser Attacks
News Preview
Many modern attacks happen entirely inside the browser, leaving little evidence for traditional security tools. Keep Aware shows why EDR, email, and SASE miss browser-only attacks and how visibility changes prevention. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
EU says TikTok faces large fine over "addictive design"
News Preview
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching the EU's Digital Services Act (DSA). [...]
© BleepingComputer 2026
© Sector News
06.02.2026
Man pleads guilty to hacking nearly 600 women’s Snapchat accounts
News Preview
An Illinois man pleaded guilty to hacking nearly 600 women's Snapchat accounts to steal nude photos that he kept, sold, or traded online, including accounts he compromised at the request of a former university track coach who was later convicted of sextortion. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
Flickr discloses potential data breach exposing users' names, emails
News Preview
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed their real names, email addresses, IP addresses, and account activity. [...]
© BleepingComputer 2026
© Sector News
06.02.2026
CISA orders federal agencies to replace end-of-life edge devices
News Preview
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive security updates from manufacturers. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Spain's Ministry of Science shuts down systems after breach claims
News Preview
Spain's Ministry of Science (Ministerio de Ciencia) announced a partial shutdown of its IT systems, affecting several citizen- and company-facing services. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Ransomware gang uses ISPsystem VMs for stealthy payload delivery
News Preview
Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Microsoft to shut down Exchange Online EWS in April 2027
News Preview
Microsoft announced today that the Exchange Web Services (EWS) API for Exchange Online will be shut down in April 2027, after nearly 20 years. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Italian university La Sapienza goes offline after cyberattack
News Preview
Rome's "La Sapienza" university has been targeted by a cyberattack that impacted its IT systems and caused widespread operational disruptions at the educational institute. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Romanian oil pipeline operator Conpet discloses cyberattack
News Preview
Conpet, Romania's national oil pipeline operator, has disclosed that a cyberattack disrupted its business systems and took down the company's website on Tuesday. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
When cloud logs fall short, the network tells the truth
News Preview
Cloud logs can be inconsistent or incomplete, creating blind spots as environments scale and change. Corelight shows how network-level telemetry provides reliable visibility when cloud logs fall short. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Newsletter platform Substack notifies users of data breach
News Preview
Newsletter platform Substack is notifying users of a data breach after attackers stole their email addresses and phone numbers in October 2025. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Data breach at fintech firm Betterment exposes 1.4 million accounts
News Preview
Hackers stole email addresses and other personal information from 1.4 million accounts after breaching the systems of automated investment platform Betterment in January. [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Zendesk spam wave returns, floods users with 'Activate account' emails
News Preview
A fresh wave of spam is hitting inboxes worldwide, with users reporting that they are once again being bombarded by automated emails generated through companies' unsecured Zendesk support systems. Some recipients say they are receiving hundreds of messages with strange or alarming subject lines. such as 'Activate account...' [...]
© BleepingComputer 2026
© Sector News
05.02.2026
Hackers compromise NGINX servers to redirect user traffic
News Preview
A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker's backend infrastructure. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
Critical n8n flaws disclosed along with public exploits
News Preview
Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and taking complete control of the host server. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
CISA: VMware ESXi flaw now exploited in ransomware attacks
News Preview
CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was used in zero-day attacks since at least February 2024. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
CISA warns of five-year-old GitLab flaw exploited in attacks
News Preview
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab vulnerability that is actively being exploited in attacks. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
The Double-Edged Sword of Non-Human Identities
News Preview
Leaked non-human identities like API keys and tokens are becoming a major breach driver in cloud environments. Flare shows how exposed machine credentials quietly grant attackers long-term access to enterprise systems. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
EDR killer tool uses signed kernel driver from forensic software
News Preview
Hackers are abusing a legitimate but long-revoked EnCase kernel driver in an EDR killer that can detect 59 security tools in attempts to deactivate them. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
New Amaranth Dragon cyberespionage group exploits WinRAR flaw
News Preview
A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law enforcement agencies. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
Microsoft rolls out native Sysmon monitoring in Windows 11
News Preview
Microsoft has started rolling out built-in Sysmon functionality to some Windows 11 systems enrolled in the Windows Insider program. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
Owner of Incognito dark web drugs market gets 30 years in prison
News Preview
A Taiwanese man was sentenced to 30 years in prison for operating Incognito Market, one of the world's largest online narcotics marketplaces that sold over $105 million worth of illegal drugs to customers worldwide. [...]
© BleepingComputer 2026
© Sector News
04.02.2026
Coinbase confirms insider breach linked to leaked support tool screenshots
News Preview
Coinbase has confirmed an insider breach after a contractor improperly accessed the data of approximately thirty customers, which BleepingComputer has learned is a new incident that occurred in December. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
Step Finance says compromised execs' devices led to $40M crypto theft
News Preview
Step Finance announced that it lost $40 million worth of digital assets after hackers compromised devices belonging to the company's team of executives. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
Wave of Citrix NetScaler scans use thousands of residential proxies
News Preview
A coordinated reconnaissance campaign targeting Citrix NetScaler infrastructure over the past week used tens of thousands of residential proxies to discover login panels. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
CISA flags critical SolarWinds RCE flaw as exploited in attacks
News Preview
CISA has flagged a critical SolarWinds Web Help Desk vulnerability as actively exploited in attacks and ordered federal agencies to patch their systems within three days. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
Iron Mountain: Data breach mostly limited to marketing materials
News Preview
Iron Mountain, a leading data storage and recovery services company, says that a recent breach claimed by the Everest extortion gang is limited to mostly marketing materials. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
AI Agent Identity Management: A New Security Control Plane for CISOs
News Preview
Autonomous AI agents are creating a new identity blind spot as they operate outside traditional IAM controls. Token Security shows why managing the full lifecycle of AI agent identities is becoming a critical CISO priority. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
UK privacy watchdog probes Grok over AI-generated sexual images
News Preview
The United Kingdom's data protection authority launched a formal investigation into X and its Irish subsidiary over reports that the Grok AI assistant was used to generate nonconsensual sexual images. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
Hackers exploit critical React Native Metro bug to breach dev systems
News Preview
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux. [...]
© BleepingComputer 2026
© Sector News
03.02.2026
French prosecutors raid X offices, summon Musk over Grok deepfakes
News Preview
French prosecutors have raided X's offices in Paris on Tuesday as part of a criminal investigation into the platform's Grok AI tool, widely used to generate sexually explicit images. [...]
© BleepingComputer 2026
© Sector News
02.02.2026
New GlassWorm attack targets macOS via compromised OpenVSX extensions
News Preview
A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. [...]
© BleepingComputer 2026
© Sector News
02.02.2026
Russian hackers exploit recently patched Microsoft Office bug in attacks
News Preview
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. [...]
© BleepingComputer 2026
© Sector News
02.02.2026
Malicious MoltBot skills used to push password-stealing malware
News Preview
More than 230 malicious packages for the personal AI assistant OpenClaw (formerly known as Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. [...]
© BleepingComputer 2026

Gamechanger in online marketing · Innovation as a service · Upgrade your own internet presence.

© 2026 Select Sector SPDRs

* * *

More Sector related Investment Ideas
© 2026 WEBs Investments ETFs
About GICS Technologies
GICS Technologies is part of the GICS Eleven information portfolio, which focuses primarily on information from listed companies in the information technology sector.
About GICS Eleven

GICS Eleven (G11, GICS11) bundles topic-specific content and enables quick access to relevant information thanks to its gate function. The project is largely based on the Global Industry Classification Standard (GICS®), which was developed by MSCI and Standard & Poor's and enables a breakdown into sectors. GICS® consists of 11 sectors, 24 industry branches, 69 industries and 158 sub-industries.

GICS® is a registered trademark of MSCI Inc. and S&P Dow Jones Indices.

Member of 3R/RSQ Network
Digital Content
Network Alliance
Transparency - Reliability - Credibility
Information regarding Product Information
Wednesday, 11.02.2026, Calendar Week 07, 42nd day of the year, 323 days remaining until EoY.