Key Market Indicator:
F&G: 49
25.267,09 NASDAQ · 50.341,99 DOW · 6.967,16 S&P · 5.051,80 Gold · 68,85 BRENT

Proteo Defence 365/24/7 
Security Audits · CyberCrime Forensics · R/G/W Teaming
Powerful app-Suite for Admins, Website operators, Research

Switch View
Source: The Hacker News Filter zurücksetzen
© Sector News
10.02.2026
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
News Preview
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK opera...
© HackerNews 2026
© Sector News
10.02.2026
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
News Preview
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to esca...
© HackerNews 2026
© Sector News
10.02.2026
From Ransomware to Residency: Inside the Rise of the Digital Parasite
News Preview
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed acro...
© HackerNews 2026
Worth to know
20.10.2025
Short Selling Radar

USA, Europe, Asia
Track Short Selling Activities worldwide
Knowing what matters
Short sale statistics, hedge fund activities and much more user-friendly information
© Sector News
10.02.2026
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
News Preview
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. "An improper neutralization of special elements used in an SQL Command ('SQL Injection...
© HackerNews 2026
Swarmalpha i/o · The Event Futures Prediction X
23.01.2026
© Sector News
10.02.2026
ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security
News Preview
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI's total funding close to $10 million. This marks a recognition from leading capital markets of a new solution: ending the era of high false positive rates ...
© HackerNews 2026
© Sector News
10.02.2026
Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
News Preview
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a mail server that was not updated to the latest version was compromised, the company's Chief Commercial Officer, Derek Curtis, said. "Prior to the...
© HackerNews 2026
© Sector News
10.02.2026
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
News Preview
The Netherlands' Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the country's parliament on Friday. "On J...
© HackerNews 2026
© Sector News
09.02.2026
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
News Preview
The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector. "UNC3886 had launched a deliberate, targeted, and well-planned campaign against Singapore's telecommunications sector," CSA said. "All four of Singapore's major telecommunications operat...
© HackerNews 2026
© Sector News
09.02.2026
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
News Preview
Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. That said, the Microsoft Defender Security Research Team said it's not clear wh...
© HackerNews 2026
© Sector News
09.02.2026
⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More
News Preview
Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths. A clear pattern this week: attackers are abusing trust. Trusted updat...
© HackerNews 2026
© Sector News
09.02.2026
How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring
News Preview
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool onto the work...
© HackerNews 2026
© Sector News
09.02.2026
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
News Preview
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT. Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing att...
© HackerNews 2026
Advertisment
20.10.2025
© Sector News
09.02.2026
TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure
News Preview
Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The activity, observed around December 25, 2025, and described as "worm-driven," leveraged exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Red...
© HackerNews 2026
© Sector News
09.02.2026
BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA
News Preview
BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution. "BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication rem...
© HackerNews 2026
© Sector News
08.02.2026
OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills
News Preview
OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem. "All skills published to ClawHub are now scanned using VirusTotal's threat intelligence, inclu...
© HackerNews 2026
© Sector News
07.02.2026
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
News Preview
Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging ap...
© HackerNews 2026
© Sector News
06.02.2026
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
News Preview
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via route...
© HackerNews 2026
© Sector News
06.02.2026
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
News Preview
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move...
© HackerNews 2026
© Sector News
06.02.2026
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
News Preview
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against go...
© HackerNews 2026
© Sector News
06.02.2026
How Samsung Knox Helps Stop Your Network Security Breach
News Preview
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use of mobile devices in business operations necessitates network security me...
© HackerNews 2026
© Sector News
06.02.2026
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
News Preview
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below - @dydxprotocol/v4-cli...
© HackerNews 2026
© Sector News
06.02.2026
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
News Preview
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched Thursday, comes with improved coding skills, including cod...
© HackerNews 2026
© Sector News
05.02.2026
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
News Preview
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the...
© HackerNews 2026
© Sector News
05.02.2026
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
News Preview
This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the poi...
© HackerNews 2026
© Sector News
05.02.2026
The Buyer’s Guide to AI Usage Control
News Preview
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions a...
© HackerNews 2026
© Sector News
05.02.2026
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
News Preview
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026. "The threat actor stopped maintaining its C2 ...
© HackerNews 2026
© Sector News
05.02.2026
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
News Preview
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613...
© HackerNews 2026
© Sector News
05.02.2026
Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
News Preview
Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS sc...
© HackerNews 2026
© Sector News
04.02.2026
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
News Preview
Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant's AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdo...
© HackerNews 2026
© Sector News
04.02.2026
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
News Preview
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and clever abuse of legitimate system features" to bypass traditional detection mechanisms and deploy a remote access trojan (RAT) known as AsyncRAT. "The attack leverages IPFS-hosted VHD files, extreme script obfu...
© HackerNews 2026
© Sector News
04.02.2026
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
News Preview
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosys...
© HackerNews 2026
© Sector News
04.02.2026
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
News Preview
An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, A...
© HackerNews 2026
© Sector News
04.02.2026
The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
News Preview
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete. I have seen IR teams recover from sophisticated intrusions with limited telemetry. I have also seen teams lose control of investigations t...
© HackerNews 2026
© Sector News
04.02.2026
Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
News Preview
Microsoft has warned that information-stealing attacks are "rapidly expanding" beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team said it observed macOS-targeted infostealer campaigns using soci...
© HackerNews 2026
© Sector News
04.02.2026
Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
News Preview
The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don't en...
© HackerNews 2026
© Sector News
04.02.2026
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
News Preview
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vu...
© HackerNews 2026
© Sector News
03.02.2026
Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
News Preview
Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybe...
© HackerNews 2026
© Sector News
03.02.2026
[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
News Preview
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, a...
© HackerNews 2026
© Sector News
03.02.2026
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
News Preview
Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote ...
© HackerNews 2026
© Sector News
03.02.2026
When Cloud Outages Ripple Across the Internet
News Preview
Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on ...
© HackerNews 2026
© Sector News
03.02.2026
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
News Preview
The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting us...
© HackerNews 2026
© Sector News
03.02.2026
Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
News Preview
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. "It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of Firefox, said. "You can also review and manage indivi...
© HackerNews 2026
© Sector News
03.02.2026
Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
News Preview
A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findi...
© HackerNews 2026
© Sector News
02.02.2026
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
News Preview
A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It's an extension to the OpenClaw project, a self-ho...
© HackerNews 2026
© Sector News
02.02.2026
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
News Preview
A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a t...
© HackerNews 2026
© Sector News
02.02.2026
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
News Preview
Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that...
© HackerNews 2026
© Sector News
02.02.2026
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
News Preview
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to...
© HackerNews 2026
© Sector News
02.02.2026
Securing the Mid-Market Across the Complete Threat Lifecycle
News Preview
For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add compl...
© HackerNews 2026
© Sector News
02.02.2026
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
News Preview
The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to malicious servers instead. "The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org," developer Don H...
© HackerNews 2026
© Sector News
02.02.2026
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
News Preview
The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. "Malicious updates were distributed through eScan's legitimate update infrastructure, resulting in the ...
© HackerNews 2026
© Sector News
02.02.2026
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
News Preview
Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions pu...
© HackerNews 2026
© Sector News
31.01.2026
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
News Preview
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest ...
© HackerNews 2026
© Sector News
31.01.2026
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
News Preview
Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies ...
© HackerNews 2026
© Sector News
31.01.2026
CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
News Preview
CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29...
© HackerNews 2026
© Sector News
30.01.2026
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
News Preview
Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any spons...
© HackerNews 2026
© Sector News
30.01.2026
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
News Preview
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, but with a specific focus on targets in Thailand and ...
© HackerNews 2026
© Sector News
30.01.2026
Badges, Bytes and Blackmail
News Preview
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: One view on the scattered fight against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencie...
© HackerNews 2026
© Sector News
30.01.2026
Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup
News Preview
A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice (DoJ) announced Thursday. Linwei Ding (aka Leon Ding), 38, was convicted by a federal jury on seven counts of economic espionage and seven counts of theft of trade secre...
© HackerNews 2026
© Sector News
30.01.2026
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
News Preview
SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-24423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code exe...
© HackerNews 2026
© Sector News
30.01.2026
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
News Preview
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog. The critical-severity vulnerabilities...
© HackerNews 2026

Gamechanger in online marketing · Innovation as a service · Upgrade your own internet presence.

© 2026 Select Sector SPDRs

* * *

More Sector related Investment Ideas
© 2026 WEBs Investments ETFs
About GICS Technologies
GICS Technologies is part of the GICS Eleven information portfolio, which focuses primarily on information from listed companies in the information technology sector.
About GICS Eleven

GICS Eleven (G11, GICS11) bundles topic-specific content and enables quick access to relevant information thanks to its gate function. The project is largely based on the Global Industry Classification Standard (GICS®), which was developed by MSCI and Standard & Poor's and enables a breakdown into sectors. GICS® consists of 11 sectors, 24 industry branches, 69 industries and 158 sub-industries.

GICS® is a registered trademark of MSCI Inc. and S&P Dow Jones Indices.

Member of 3R/RSQ Network
Digital Content
Network Alliance
Transparency - Reliability - Credibility
Information regarding Product Information
Wednesday, 11.02.2026, Calendar Week 07, 42nd day of the year, 323 days remaining until EoY.