MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules
27
Jan
2026

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules….

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer
27
Jan
2026

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer

Threat actors have successfully exploited a design flaw in GitHub’s fork architecture to distribute malware disguised as the legitimate GitHub…

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
27
Jan
2026

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

Ravie LakshmananJan 27, 2026Web Security / Malware Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has…

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware
27
Jan
2026

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware

A judge has ordered the Kingdom of Saudi Arabia (KSA) to pay compensation of £3m to a London-based dissident who…

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users
27
Jan
2026

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users

A dangerous phishing campaign is targeting cryptocurrency holders through video calls that use artificial intelligence to create fake versions of…

Talking Points for Government CISOs and Cybersecuirty Leaders in 2026
27
Jan
2026

Talking Points for Government CISOs and Cybersecuirty Leaders in 2026

Dan Lohrmann is calling all government CISOs (and yes, CTOs, CIOs, CFOs, COOs, and even a few corporate CEOs can listen…

Microsoft brings AI-powered investigations to security teams
27
Jan
2026

Microsoft brings AI-powered investigations to security teams

Microsoft Purview Data Security Investigations is now available. The tool is part of Microsoft Purview and is intended for scenarios…

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
27
Jan
2026

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

Ravie LakshmananJan 27, 2026Vulnerability / Cloud Security A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version…

How I sped up exploit validation in Repeater using Burp AI | Blog
27
Jan
2026

How I sped up exploit validation in Repeater using Burp AI | Blog

Hassan Ud-Deen | 22 January 2026 at 15:18 UTC Note: This is a guest post by IT security consultant Adarsh Kumar….

Multiple Vulnerabilities in React Server Components Enable DoS Attacks
27
Jan
2026

Multiple Vulnerabilities in React Server Components Enable DoS Attacks

Multiple critical security vulnerabilities have recently been disclosed in React Server Components, enabling threat actors to launch Denial-of-Service (DoS) attacks…

DoJ Charges 31 in Huge ATM Jackpotting Ring
27
Jan
2026

US Charges 31 Suspects in Nationwide ATM Jackpotting Scam – Hackread – Cybersecurity News, Data Breaches, AI, and More

The DoJ has charged 31 individuals in a massive nationwide ATM jackpotting scam, with some allegedly linked to the Tren…

AWS adds IPv6 support to IAM Identity Center through dual-stack endpoints
27
Jan
2026

AWS adds IPv6 support to IAM Identity Center through dual-stack endpoints

Amazon Web Services has added IPv6 support to IAM Identity Center through new dual-stack endpoints. The update allows identity services…