Security Affairs newsletter Round 562 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Overview

La Sapienza, a prominent university in Italy, is currently offline as a precautionary measure after suffering a cyber attack. The institution has taken this step to mitigate any further damage while they assess the situation and secure their systems. This incident has raised concerns about the security of educational institutions, which are often targets for cybercriminals. The attack underscores the need for universities to bolster their cybersecurity defenses to protect sensitive information and ensure the continuity of their operations. While details about the nature of the attack are still emerging, the university's proactive approach highlights the importance of readiness in the face of such threats.

Key Takeaways

  • Affected Systems: La Sapienza university systems
  • Timeline: Ongoing since recent cyber attack

Original Article Summary

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Italian university La Sapienza still offline to mitigate recent cyber attack CISA pushes Federal agencies to […]

Impact

La Sapienza university systems

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Ongoing since recent cyber attack

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server

Hackread – Cybersecurity News, Data Breaches, AI and More

A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.

Feb 8, 2026

New tool blocks imposter attacks disguised as safe commands

BleepingComputer

Researchers have introduced an open-source tool named Tirith, designed to combat homoglyph attacks in command-line environments. These attacks occur when malicious commands use visually similar characters to disguise themselves as legitimate commands, tricking users into executing harmful actions. Tirith works by analyzing URLs within typed commands and preventing their execution if they are deemed suspicious. This tool is particularly relevant for developers and system administrators who rely on command-line interfaces, as it provides an additional layer of security against deceptive tactics used by attackers. By implementing Tirith, users can better protect their systems from these types of impersonation attacks, which can lead to unauthorized access and potential data breaches.

Feb 8, 2026

DKnife toolkit abuses routers to spy and deliver malware since 2019

Security Affairs

Researchers at Cisco Talos have identified a toolkit called DKnife that has been in use since 2019 to hijack router traffic for cyber-espionage purposes. This Linux-based toolkit allows attackers to inspect and alter data as it travels through routers and edge devices. It can also install malware on various devices, including PCs and smartphones. The implications of this toolkit are significant, as it poses a threat to the confidentiality and integrity of sensitive data transmitted over networks. Users and organizations relying on affected routers should be particularly vigilant about their network security practices to mitigate potential risks.

Feb 8, 2026

CISA pushes Federal agencies to retire end-of-support edge devices

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to take action on outdated edge network devices. Under the new Binding Operational Directive 26-02, agencies must improve the management of these devices and replace any that are no longer supported within the next 12 to 18 months. This directive aims to mitigate risks associated with using unsupported technology, which can be vulnerable to cyberattacks and security breaches. By addressing these outdated devices, CISA is pushing for better security practices to protect federal networks and sensitive information. The move emphasizes the need for agencies to stay current with technology and avoid potential exploitation by cybercriminals.

Feb 7, 2026

Reports shed light on more OpenClaw vulnerabilities

SCM feed for Latest

Recent reports indicate that nearly 7.1% of skills associated with the open-source AI agent OpenClaw on the ClawHub marketplace may be exposing sensitive information such as API keys, credentials, and credit card details. This vulnerability arises from issues in the SKILL.md instructions, which guide developers on how to create and use these skills. The exposure of such critical data can lead to unauthorized access and financial fraud, impacting both developers and users who rely on these AI capabilities. It's crucial for developers to review their implementations and ensure they are safeguarding sensitive information to prevent potential exploitation. This incident serves as a reminder of the importance of secure coding practices in open-source projects.

Feb 6, 2026

AI-based scam spoofing law firms uncovered

SCM feed for Latest

A recent investigation uncovered over 150 domains impersonating law firms as part of a scam that uses artificial intelligence. These fake websites are designed to deceive individuals and businesses by mimicking legitimate legal services. The scammers aim to exploit unsuspecting victims, potentially leading to financial losses and legal complications for those who engage with these fraudulent sites. This incident raises concerns about the effectiveness of current cybersecurity measures and the challenges of identifying AI-generated content. As cybercriminals increasingly utilize advanced technology, it becomes essential for both users and legal professionals to remain vigilant against such impersonation schemes.

Feb 6, 2026