Learn. Grow. Repeat.

Be a part of your own growth

Stay up to Date

Never forget, half the battle is knowing. Stay up to date on the latest security trends and information

The Hacker News

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Jan. 24, 2026

Article Summary

A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs rese

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Jan. 24, 2026

Article Summary

The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025. The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week. "The com

Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents

Jan. 24, 2026

Article Summary

AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits: “Wait… who approved

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

Jan. 24, 2026

Article Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability

PortSwigger Research

Top 10 web hacking techniques of 2025: call for nominations

Jan. 6, 2026

Article Summary

Update: nominations are now closed, and voting is live! Cast your vote here Over the last year, security researchers have shared a huge amount of work with the community through blog posts, presentati

The Fragile Lock: Novel Bypasses For SAML Authentication

Dec. 10, 2025

Article Summary

TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi

Introducing HTTP Anomaly Rank

Nov. 11, 2025

Article Summary

HTTP Anomaly Rank If you've ever used Burp Intruder or Turbo Intruder, you'll be familiar with the ritual of manually digging through thousands of responses by repeatedly sorting the table via length,

WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine

Sept. 17, 2025

Article Summary

Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis. This is a huge blind spot, leaving many bugs like Broken Access Controls, Race condi

Krebs on Security

Kimwolf Botnet Lurking in Corporate, Govt. Networks

Jan. 20, 2026

Article Summary

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of comprom

Patch Tuesday, January 2026 Edition

Jan. 14, 2026

Article Summary

Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.

Who Benefited from the Aisuru and Kimwolf Botnets?

Jan. 8, 2026

Article Summary

Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and cyb

The Kimwolf Botnet is Stalking Your Local Network

Jan. 2, 2026

Article Summary

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about the

Dark Reading

2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems

Jan. 24, 2026

Article Summary

Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.

Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles

Jan. 23, 2026

Article Summary

Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.

Exploited Zero-Day Flaw in Cisco UC Could Affect Millions

Jan. 23, 2026

Article Summary

Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.

Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases

Jan. 23, 2026

Article Summary

GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.

CSO Online

Fortinet confirms new zero-day attacks against customer devices

Jan. 23, 2026

Article Summary

Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud single sign-on (SSO)

The cybercrime industry continues to challenge CISOs in 2026

Jan. 23, 2026

Article Summary

Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a return on investment (ROI)-oriented economy, focused on speed and monetization,” according to Martin Zugec, Bitdefender’s director of t

NETSCOUT recognized for leadership in network detection and response

Jan. 23, 2026

Article Summary

We’re proud to share that NETSCOUT has been recognized for industry-leading excellence in network detection and response (NDR). This acknowledgment, from Quadrant Knowledge Solutions’ 2025 SPARK Matrix™ for NDR, highlights what our customers already know: NETSCOUT delivers unmatched visibility, prec

Smarter DDoS security at scale

Jan. 23, 2026

Article Summary

In today’s digital landscape, encrypted traffic is the norm—not the exception. While encryption such as Transport Layer Security (TLS) 1.3 protects user privacy and data integrity, it also presents a growing challenge for security teams: How do you defend against threats hidden inside encrypted traf

CISA Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

Jan. 23, 2026

Article Summary

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability  This type of vulnerability is a frequent attack vector for malicious cyber

Product Categories for Technologies That Use Post-Quantum Cryptography Standards

Jan. 23, 2026

Article Summary

Executive Summary In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144,” the Cybersecurity and Infrastructure Security Agency (CISA) is providing and regularly upd

Schneider Electric EcoStruxure Process Expert

Jan. 22, 2026

Article Summary

View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxureTM Process and EcoStruxure™ Process Expert for AVEVA System Platform products. The EcoStruxureTM Process is a single automation system to engineer, operate, and maintain your entire infrastructure for a sustainable, p

EVMAPA

Jan. 22, 2026

Article Summary

View CSAF Summary Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses. The following versions of EVMAPA are affected: EVMAPA (CVE-20

Bleeping Computer

1Password adds pop-pup warnings for suspected phishing sites

Jan. 25, 2026

Article Summary

The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. [...]

Microsoft investigates Windows 11 boot failures after January updates

Jan. 25, 2026

Article Summary

Microsoft is investigating reports that some Windows 11 devices are failing to boot with "UNMOUNTABLE_BOOT_VOLUME" errors after installing the January 2026 Patch Tuesday security updates. [...]

Microsoft releases emergency OOB update to fix Outlook freezes

Jan. 25, 2026

Article Summary

Microsoft has released emergency, out-of-band updates on Saturday for Windows 10, Windows 11, and Windows Server to fix an issue that prevented Microsoft Outlook classic from opening when using PSTs stored in cloud storage. [...]

Sandworm hackers linked to failed wiper attack on Poland’s energy systems

Jan. 24, 2026

Article Summary

A cyberattack targeting Poland's power grid in late December 2025 has been linked to the Russian state-sponsored hacking group Sandworm, which attempted to deploy a new destructive data-wiping malware dubbed DynoWiper during the attack.. [...]