Operation Bizarre Bazaar: New LLMjacking Campaign Targets Unprotected Models
29
Jan
2026

New LLMjacking Campaign Targets Unprotected Models – Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a new kind of theft where hackers break into a company’s AI and sell its power to…

Pulling the plug: A way to halt a cyber attacker in your network?
29
Jan
2026

RAMP ransomware forum goes dark in probable FBI sting

The Russian-speaking RAMP cyber crime forum – one of the most significant players in the underground cyber criminal ecosystem –…

Remote Access to Every Conversation · Joseph Thacker
29
Jan
2026

Remote Access to Every Conversation · Joseph Thacker

My neighbor texted me the other day and said she’d pre-ordered two AI toys for her kids that supposedly used…

CISA, security researchers warn FortiCloud SSO flaw is under attack
29
Jan
2026

CISA, security researchers warn FortiCloud SSO flaw is under attack

Federal authorities and security researchers are warning about a critical vulnerability in Fortinet FortiCloud single sign-on, which is currently under…

Essential E-Signature Solutions for Cybersecurity in 2026
29
Jan
2026

Essential E-Signature Solutions for Cybersecurity in 2026

E-signatures are now part of your security posture. In 2026, most organizations sign contracts, approvals, onboarding packets, and financial documents…

An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account
29
Jan
2026

An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account

Even now that the data is secured, Margolis and Thacker argue that it raises questions about how many people inside…

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware
29
Jan
2026

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware

Cybercriminals are exploiting Google Search Ads to distribute malware through deceptive landing pages that impersonate Apple’s official website design. The…

Is the Investigatory Powers Tribunal powerless?
29
Jan
2026

Metropolitan Police needs effective constraints on live facial recognition use, court hears

There is virtually nothing in the Metropolitan Police policy to constrain where it deploys live facial recognition (LFR), the High…

Microsoft Teams
29
Jan
2026

New Microsoft Teams feature will let you report suspicious calls

Microsoft plans to introduce a call reporting feature in Teams by mid-March, allowing users to flag suspicious or unwanted calls as…

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record
29
Jan
2026

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record

The Aisuru/Kimwolf botnet unleashed the largest publicly disclosed distributed denial-of-service (DDoS) attack in history, peaking at an unprecedented 31.4 terabits…

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems
29
Jan
2026

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems

Swarmer, a sophisticated tool designed to manipulate Windows registry hives while bypassing endpoint detection systems. The tool exploits legacy Windows…

29
Jan
2026

Google disrupts proxy network used by 550+ threat groups

Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile…