The NSA lays out the first steps for zero trust adoption
15
Jan
2026

The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users,…

China bans U.S. and Israeli cybersecurity software over security concerns
15
Jan
2026

China bans U.S. and Israeli cybersecurity software over security concerns

China bans U.S. and Israeli cybersecurity software over security concerns Pierluigi Paganini January 15, 2026 China has told domestic firms…

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
15
Jan
2026

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses

Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global…

Vic Education database breached via school's network
15
Jan
2026

Vic Education database breached via school’s network

All Victorian government schools and their students are impacted by the breach of a Department of Education database that has…

Microsoft
15
Jan
2026

Microsoft disrupts massive RedVDS cybercrime virtual desktop service

Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported…

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers
15
Jan
2026

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Threat actors linked to Chinese hosting infrastructure have established a massive network of over 18,000 active command-and-control servers across 48…

CISOs flag gaps in third-party risk management
15
Jan
2026

CISOs flag gaps in third-party risk management

Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger…

CSIRO looks to next-gen AI agents to fulfil 'copilot' promise
15
Jan
2026

Microsoft patches single-click Copilot data stealing attack

The first Patch Tuesday (Wednesday in the Antipodes) for the year included a fix for a single-click prompt injection attack…

GoLogin vs MultiLogin vs VMLogin - What's the Anti-Detect Browsers Difference? - GBHackers Security
15
Jan
2026

GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference? – GBHackers Security

A web browser is a door to the Global Network, allows to surf through different resources, obtain all required information,…

LinkedIn wants to make verification a portable trust signal
15
Jan
2026

LinkedIn wants to make verification a portable trust signal

In this Help Net Security interview, Oscar Rodriguez, VP Trust Product at LinkedIn, discusses how verification is becoming a portable…

Google
15
Jan
2026

Google’s Personal Intelligence links Gmail, Photos and Search to Gemini

Google is rolling out ‘Personal Intelligence,’ a new Gemini feature that pulls your data from Gmail, Photos, Google Search, and…

QR codes are getting colorful, fancy, and dangerous
15
Jan
2026

QR codes are getting colorful, fancy, and dangerous

QR codes have become a routine part of daily life, showing up on emails, posters, menus, invoices, and login screens….