QLD government appoints interim CISO
09
Feb
2026

Qld Child Safety IT system to be fixed within six months

The Queensland government has assembled a team of 120 staff to remediate a $183 million client and case management system…

Hackers breach SmarterTools network using flaw in its own software
09
Feb
2026

Hackers breach SmarterTools network using flaw in its own software

SmarterTools confirmed last week that the Warlock ransomware gang breached its network after compromising an email system, but it did…

An illustrated padlock is mounted into a microphone stand with sound waves emitting from the device.
09
Feb
2026

Is your phone listening to you? (re-air) (Lock and Code S07E03)

This week on the Lock and Code podcast… In January, Google settled a lawsuit that pricked up a few ears:…

09
Feb
2026

European Commission Mobile Cyberattack Meets Swift Response

The European Commission’s central infrastructure for managing mobile devices was hit by a cyberattack on January 30, the Commission has…

BoM reveals plan to fix website within six months
09
Feb
2026

BoM reveals plan to fix website within six months

The Bureau of Meteorology says it will take six months to address the deluge of community outrage its new $96.5…

Cyber Attack Hits European Commission Staff Mobile Systems
09
Feb
2026

Cyber Attack Hits European Commission Staff Mobile Systems

Swift action by CERT-EU contained the breach within nine hours, linked to critical Ivanti software flaws (CVE-2026-1281 and CVE-2026-1340). The…

Cyber Espionage Campaign
09
Feb
2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus…

Threat actors target SolarWinds Web Help Desk flaw
09
Feb
2026

Threat actors target SolarWinds Web Help Desk flaw

Security researchers warn that multiple enterprise customers have been compromised in connection with a critical flaw in SolarWinds Web Help…

Hackers Exploiting Ivanti EPMM Devices to Deploy Dormant Backdoors
09
Feb
2026

Hackers Exploiting Ivanti EPMM Devices to Deploy Dormant Backdoors

Ivanti EPMM Devices Exploited Hackers are actively exploiting Ivanti Endpoint Manager Mobile (EPMM) appliances to plant “dormant” backdoors that can…

FTC data highlights online threats to consumers and businesses
09
Feb
2026

FTC data highlights online threats to consumers and businesses

Ransomware and other cyberattacks represent a tiny fraction of the fraud complaints that Americans file with the Federal Trade Commission,…

Criminal IP Adds Real-Time Threat Intelligence to IBM QRadar
09
Feb
2026

Criminal IP Integrates with IBM QRadar to Deliver Real-Time Threat Intelligence Across SIEM and SOAR

Torrance, United States / California, February 9th, 2026, CyberNewswire Criminal IP (criminalip.io), the AI-powered threat intelligence and attack surface intelligence…

Criminal IP Adds Real-Time Threat Intelligence to IBM QRadar
09
Feb
2026

Criminal IP Adds Real-Time Threat Intelligence to IBM QRadar

Torrance, United States / California, February 9th, 2026, CyberNewswire Criminal IP (criminalip.io), the AI-powered threat intelligence and attack surface intelligence…