New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads
22
Jan
2026

New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads

A sophisticated multi-stage malware campaign targeting Russian users, leveraging social engineering, legitimate cloud services, and native Windows functionality to achieve…

VoidLink Malware Puts Cloud Systems on High Alert With Custom Built Attacks
22
Jan
2026

VoidLink Malware Puts Cloud Systems on High Alert With Custom Built Attacks – Hackread – Cybersecurity News, Data Breaches, AI, and More

A highly adaptable threat named VoidLink is putting cloud environments on high alert. First brought to light by Check Point…

report-ad-banner
22
Jan
2026

Fortinet Admins Report Active Exploits On Fixed FortiOS Bug

Network administrators worldwide are scrambling this morning following credible reports that the critical Fortinet Single Sign-On (SSO) vulnerability, tracked as…

Pwn2Own Automotive Tokyo
22
Jan
2026

Hackers exploit 29 zero-days on second day of Pwn2Own Automotive

On the second day of Pwn2Own Automotive 2026, security researchers collected $439,250 in cash awards after exploiting 29 unique zero-days….

CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks
22
Jan
2026

CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after confirming active exploitation of a zero-day…

Malicious PyPI Package Impersonates sympy-dev, Targeting Millions of Users
22
Jan
2026

Malicious PyPI Package Impersonates sympy-dev, Targeting Millions of Users

A dangerous supply-chain attack targeting the Python Package Index (PyPI) that involves a malicious package named sympy-dev impersonating SymPy, one…

Under Armour
22
Jan
2026

Under Armour ransomware breach: data of 72 million customers appears on the dark web

When reports first emerged in November 2025 that sportswear giant Under Armour had been hit by the Everest ransomware group,…

Filling the Most Common Gaps in Google Workspace Security
22
Jan
2026

Filling the Most Common Gaps in Google Workspace Security

The Hacker NewsJan 22, 2026Email Security / SaaS Security Security teams at agile, fast-growing companies often have the same mandate:…

Preparing for post quantum computing will be more difficult than the millenium bug
22
Jan
2026

EU researchers inch closer to a viable quantum internet

European scientists have claimed significant progress in their efforts to create a network device that will become the fundamental building…

Fortinet
22
Jan
2026

Hackers breach Fortinet FortiGate devices, steal firewall configs

Fortinet FortiGate devices are being targeted in automated attacks that create rogue accounts and steal firewall configuration data, according to cybersecurity…

Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code Injection
22
Jan
2026

Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code Injection

A critical code-injection vulnerability has been identified in the Node.js binary-parser library, affecting all versions before 2.3.0. The flaw allows…

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
22
Jan
2026

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions

A sophisticated ClickFix campaign targeting Facebook users has been identified, leveraging social engineering to extract live session credentials directly from…