Flickr Data Breach: Third‑Party Email Provider Exposes User Contact Details

Golden Gate Bridge spans a bay with people and wildlife enjoying the waterfront.

Flickr has notified its users about a potential exposure of personal data caused not by a compromise of its own infrastructure, but by a security vulnerability at a third‑party email marketing provider. Attackers were able to access information about subscribers to Flickr’s service and marketing emails, including user names, email addresses and notification preferences. Flickr … Read more

DKnife: Stealthy Linux Framework Turns Routers into Man‑in‑the‑Middle Platforms

Individuals monitoring cyber threats in a futuristic command center setting.

Cisco Talos has disclosed the discovery of DKnife, a modular Linux-based post‑exploitation framework that has been quietly abused since at least 2019 to compromise routers and network gateways. Once deployed, DKnife converts network infrastructure into a powerful man‑in‑the‑middle (MitM) platform capable of intercepting, modifying and rerouting user traffic with minimal disruption and low detection probability. … Read more

OpenClaw AI Skills Hit by Malware Wave: VirusTotal Integration and New Security Controls

Four individuals examine technology and symbols of cybersecurity at a dimly lit table.

Extension ecosystems for AI assistants are rapidly becoming a prime target for attackers. In the case of the open‑source AI agent OpenClaw (formerly Moltbot / ClawdBot), security researchers have identified a large wave of malicious skills, forcing the platform to tighten its security model and integrate automated scanning via VirusTotal for all skills uploaded to … Read more

Bithumb’s 620,000 BTC Payout Error: A Critical Lesson in Crypto Exchange Operational Risk

South Korean traders analyze Bitcoin trends with coins and charts.

On 6 February 2026, South Korean cryptocurrency exchange Bithumb experienced one of the most striking incidents in the history of digital asset trading — not due to a hack, but because of an internal operational error. During a routine promotion, users were mistakenly credited with approximately 620,000 BTC, worth around 40 billion USD at the … Read more

Critical n8n Vulnerability CVE-2026-25049 Enables Sandbox Escape and Remote Code Execution

Close-up of a dusty Ethernet connection with circuit board and code display.

A critical security flaw has been discovered in the popular workflow automation platform n8n. Tracked as CVE-2026-25049 with a CVSS score of 9.4, the vulnerability allows authenticated users to escape n8n’s JavaScript sandbox and execute arbitrary system commands on the underlying server, effectively taking full control of the n8n instance. How CVE-2026-25049 Breaks n8n’s JavaScript … Read more

Microsoft Launches Backdoor Scanner to Secure Open-Weight LLMs

Two figures interact with a glowing brain graphic on a dark, tech-themed screen.

As attacks on artificial intelligence systems intensify, the security of large language models (LLMs) is becoming a critical concern for both vendors and enterprises. In response, Microsoft AI Security has introduced a specialized scanner designed to detect backdoors in open-weight LLMs—models whose weights are publicly accessible. The tool aims to uncover hidden malicious behaviors embedded … Read more

Coinbase Confirms New Contractor Data Breach: What Happened and Why It Matters

Employee shows concern while another focuses on a laptop in a dimly lit office.

The largest U.S. cryptocurrency exchange, Coinbase, has confirmed a new user data breach originating from an external contractor. According to the company, attackers accessed information relating to approximately 30 customers. The incident dates back to December 2025 and is not linked to the earlier large‑scale compromise involving the outsourcing provider TaskUs. Coinbase data breach through … Read more

Stealth Nginx Traffic Hijacking Campaign Exploits React2Shell and Baota Servers

Panoramic view of a river cityscape with temples and modern buildings at sunset.

Datadog Security Labs has reported a large-scale malicious campaign in which attackers gain access to Nginx servers and silently route user traffic through their own infrastructure. The attack abuses legitimate Nginx reverse proxy features, making the activity appear indistinguishable from normal load balancing and therefore extremely difficult for traditional monitoring and security tools to detect. … Read more

Substack Data Breach: Emails, Phone Numbers and Account Metadata Exposed

Man reviews data breach notification with multiple screens displaying alerts.

Substack has notified users of a data breach in which email addresses, phone numbers and internal account metadata were exposed to an unauthorized third party. According to the company, the intrusion occurred in October 2025 but was only detected in early February, leaving a multi‑month window during which the data could have been misused. Scope … Read more

Open VSX Introduces Pre-Publication Security Scanning for VS Code Extensions

Aerial view of Microsoft headquarters with Eclipse Foundation signage nearby.

The Open VSX extension registry, maintained by the Eclipse Foundation, is introducing automated, pre-publication security scanning for Visual Studio Code extensions. The initiative aims to reduce software supply chain risks and prevent malicious VS Code extensions from reaching developer workstations and enterprise environments. Why VS Code Extension Security Is Now a Supply Chain Priority Extensions … Read more