Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
22
Jan
2026

Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts

Ravie LakshmananJan 22, 2026Cryptojacking / Malware A new malicious package discovered in the Python Package Index (PyPI) has been found…

UK government begins trials of digital driving licence
22
Jan
2026

UK government begins trials of digital driving licence

The UK government has begun testing of a digital driving licence – the highest profile official document so far to…

BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
22
Jan
2026

BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records

A high-severity vulnerability has been disclosed in BIND 9, the widely used DNS server software responsible for domain name resolution…

Active Exploitation Of Fortinet SSO Flaw Targets Firewalls For Admin Takeover
22
Jan
2026

Active Exploitation Of Fortinet SSO Flaw Targets Firewalls For Admin Takeover

Threat actors actively exploit critical Fortinet vulnerabilities CVE-2025-59718 and CVE-2025-59719 to bypass FortiCloud SSO authentication on firewalls and proxies. These…

TeraWave space-based network aims for 6 Tbps connectivity worldwide
22
Jan
2026

TeraWave space-based network aims for 6 Tbps connectivity worldwide

Blue Origin announced TerraWave, a satellite communications network designed to support enterprise, data center, and government users that rely on…

New AI-Android Malware that Auto Clicks Ads from the Infected Devices
22
Jan
2026

New AI-Android Malware that Auto Clicks Ads from the Infected Devices

A dangerous Android malware campaign has emerged, targeting users through mobile games and pirated streaming app modifications. The threat, known…

Spyware and RATs used to target WhatsApp and Signal Users
22
Jan
2026

U.S. CISA adds a flaw in Cisco Unified Communications products to its Known Exploited Vulnerabilities catalog

U.S. CISA adds a flaw in Cisco Unified Communications products to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 22,…

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
22
Jan
2026

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Ravie LakshmananJan 22, 2026Network Security / Vulnerability Cybersecurity company Arctic Wolf has warned of a “new cluster of automated malicious…

New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature
22
Jan
2026

New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature

ClearFake has entered a new and more dangerous phase, turning a familiar fake CAPTCHA scam into a highly evasive malware…

Exposed training apps are showing up in active cloud attacks
22
Jan
2026

Exposed training apps are showing up in active cloud attacks

Security teams often spin up vulnerable applications for demos, training, or internal testing. A recent Pentera research report documents how…

report-ad-banner
22
Jan
2026

Ingram Micro Data Breach Impacts Staff, Applicants

Ingram Micro, one of the world’s largest IT distributors, has confirmed that sensitive personal data was leaked following a ransomware…

22
Jan
2026

UK Businesses Cyberattack Survival At Risk, Study Finds

UK businesses are facing growing pressure from cyber threats, with a new survey warning that many may not withstand major…