Jen Easterly, a longtime public- and private-sector cybersecurity practitioner who led the US Cybersecurity and Infrastructure Security Agency for more…
A new name is surfacing in cyber intelligence reports that has security teams on edge. Known as CastleLoader, it has…
The AI radar 2026 study from Boston Consulting Group (BCG) has reported that artificial intelligence (AI) investment is set to…
Turla, a sophisticated threat actor known for targeted cyber attacks, has deployed an upgraded version of its Kazuar v3 loader…
Google offers a Validator App through the Play Store that vendors have to run as part of getting their products…
It turns out that even in the world of software, ‘old’ doesn’t mean ‘gone.’ In a report shared with Hackread.com,…
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for…
Palo Alto Networks addressed a GlobalProtect flaw, PoC exists Pierluigi Paganini January 15, 2026 Palo Alto Networks addressed a flaw…
A joint operation led by Microsoft and international law enforcement has dismantled a business email compromise (BEC) attack chain powered…
Zoho Corporation has opened its first datacentres in the UAE, marking a significant milestone in the company’s long-term investment in…
Mozilla released Firefox 147 on January 13, 2026, addressing 16 security vulnerabilities detailed in the Mozilla Foundation Security Advisory. The…
Amazon has made the AWS European Sovereign Cloud generally available to customers across the European Union, backed by a €7.8…
