One privacy change I made for 2026 (Lock and Code S07E02)
This week on the Lock and Code podcast… When you hear the words “data privacy,” what do you first imagine? Maybe you picture going into…
This week on the Lock and Code podcast… When you hear the words “data privacy,” what do you first imagine? Maybe you picture going into…
An out-of-band (OOB) cumulative update, KB5078127, to address critical file system compatibility issues affecting Windows 11 users. The update resolves widespread problems introduced by the…
As users continue to assess the Under Armour data breach, WorldLeaks, the rebranded version of the Hunters International ransomware group, is claiming to have breached…
Federal departments and agencies are set to benefit from a whole-of-government learning technology ecosystem, after 37 agencies came together on draft “user, business and system…
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint Pierluigi Paganini January 26, 2026 Microsoft warns of a multi-stage phishing and BEC campaign…
North Korea’s Lazarus Group has launched a sophisticated supply chain attack targeting software developers through a campaign called “Fake Font.” The threat actors are using…
Suspected Russian cyber attackers tried to take down parts of Poland’s energy infrastructure with new data-wiping malware – and failed. According to information shared by…
The Australian Electoral Commission will use Accenture to build and deliver a new technology system to implement election donation laws that passed parliament early last…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered federal agencies to secure…
Browser attacks have become far more dangerous and organized than before. A new threat called Stanley, discovered in January 2026, shows just how serious the…
Blackpoint Cyber discovered a new Fake CAPTCHA campaign that tricks users into installing Amatera Stealer. By abusing legitimate Microsoft scripts and hiding malicious code in…
The Hacker NewsJan 26, 2026Endpoint Security / Artificial Intelligence If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive…