Stay up to Date
Never forget, half the battle is knowing. Stay up to date on the latest security trends and information
The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
Jan. 24, 2026
Article Summary
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs rese
New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
Jan. 24, 2026
Article Summary
The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025. The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week. "The com
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
Jan. 24, 2026
Article Summary
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits: “Wait… who approved
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
Jan. 24, 2026
Article Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability
PortSwigger Research
Top 10 web hacking techniques of 2025: call for nominations
Jan. 6, 2026
Article Summary
Update: nominations are now closed, and voting is live! Cast your vote here Over the last year, security researchers have shared a huge amount of work with the community through blog posts, presentati
The Fragile Lock: Novel Bypasses For SAML Authentication
Dec. 10, 2025
Article Summary
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
Introducing HTTP Anomaly Rank
Nov. 11, 2025
Article Summary
HTTP Anomaly Rank If you've ever used Burp Intruder or Turbo Intruder, you'll be familiar with the ritual of manually digging through thousands of responses by repeatedly sorting the table via length,
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
Sept. 17, 2025
Article Summary
Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis. This is a huge blind spot, leaving many bugs like Broken Access Controls, Race condi
Krebs on Security
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Jan. 20, 2026
Article Summary
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of comprom
Patch Tuesday, January 2026 Edition
Jan. 14, 2026
Article Summary
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.
Who Benefited from the Aisuru and Kimwolf Botnets?
Jan. 8, 2026
Article Summary
Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and cyb
The Kimwolf Botnet is Stalking Your Local Network
Jan. 2, 2026
Article Summary
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about the
Dark Reading
2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems
Jan. 24, 2026
Article Summary
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
Jan. 23, 2026
Article Summary
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
Jan. 23, 2026
Article Summary
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
Jan. 23, 2026
Article Summary
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
CSO Online
Fortinet confirms new zero-day attacks against customer devices
Jan. 23, 2026
Article Summary
Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud single sign-on (SSO)
The cybercrime industry continues to challenge CISOs in 2026
Jan. 23, 2026
Article Summary
Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a return on investment (ROI)-oriented economy, focused on speed and monetization,” according to Martin Zugec, Bitdefender’s director of t
NETSCOUT recognized for leadership in network detection and response
Jan. 23, 2026
Article Summary
We’re proud to share that NETSCOUT has been recognized for industry-leading excellence in network detection and response (NDR). This acknowledgment, from Quadrant Knowledge Solutions’ 2025 SPARK Matrix™ for NDR, highlights what our customers already know: NETSCOUT delivers unmatched visibility, prec
Smarter DDoS security at scale
Jan. 23, 2026
Article Summary
In today’s digital landscape, encrypted traffic is the norm—not the exception. While encryption such as Transport Layer Security (TLS) 1.3 protects user privacy and data integrity, it also presents a growing challenge for security teams: How do you defend against threats hidden inside encrypted traf
CISA Advisories
CISA Adds One Known Exploited Vulnerability to Catalog
Jan. 23, 2026
Article Summary
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber
Product Categories for Technologies That Use Post-Quantum Cryptography Standards
Jan. 23, 2026
Article Summary
Executive Summary In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144,” the Cybersecurity and Infrastructure Security Agency (CISA) is providing and regularly upd
Schneider Electric EcoStruxure Process Expert
Jan. 22, 2026
Article Summary
View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxureTM Process and EcoStruxure™ Process Expert for AVEVA System Platform products. The EcoStruxureTM Process is a single automation system to engineer, operate, and maintain your entire infrastructure for a sustainable, p
EVMAPA
Jan. 22, 2026
Article Summary
View CSAF Summary Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses. The following versions of EVMAPA are affected: EVMAPA (CVE-20
Bleeping Computer
1Password adds pop-pup warnings for suspected phishing sites
Jan. 25, 2026
Article Summary
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. [...]
Microsoft investigates Windows 11 boot failures after January updates
Jan. 25, 2026
Article Summary
Microsoft is investigating reports that some Windows 11 devices are failing to boot with "UNMOUNTABLE_BOOT_VOLUME" errors after installing the January 2026 Patch Tuesday security updates. [...]
Microsoft releases emergency OOB update to fix Outlook freezes
Jan. 25, 2026
Article Summary
Microsoft has released emergency, out-of-band updates on Saturday for Windows 10, Windows 11, and Windows Server to fix an issue that prevented Microsoft Outlook classic from opening when using PSTs stored in cloud storage. [...]
Sandworm hackers linked to failed wiper attack on Poland’s energy systems
Jan. 24, 2026
Article Summary
A cyberattack targeting Poland's power grid in late December 2025 has been linked to the Russian state-sponsored hacking group Sandworm, which attempted to deploy a new destructive data-wiping malware dubbed DynoWiper during the attack.. [...]