Like it or not, AI will transform cyber strategy in 2026
23
Jan
2026

Ransomware, reputation, risk: Black Hat Europe in review, 2026 in view

Common failures in security that enable vulnerabilities to be exploited, as well as the politicisation of technology leading to its…

NIST loses key cyber experts in standards and research
23
Jan
2026

NIST is rethinking its role in analyzing software vulnerabilities

The National Institute of Standards and Technology is reevaluating its role in analyzing software vulnerabilities as it tries to meet…

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls
23
Jan
2026

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

A new security feature for Teams Calling now alerts users to suspicious external calls that try to impersonate trusted organizations….

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
23
Jan
2026

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service. The flaw,…

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved…

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
23
Jan
2026

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security…

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed
23
Jan
2026

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed

The UK government is facing scrutiny for failing to do its due diligence on the environmental impacts of hyperscale datacentres,…

Intruder invaders
23
Jan
2026

What an AI-Written Honeypot Taught Us About Trusting Machines

“Vibe coding” — using AI models to help write code — has become part of everyday development for a lot…

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

A sophisticated macOS malware called MacSync has emerged as a dangerous new threat targeting cryptocurrency users through deceptive social engineering…

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
23
Jan
2026

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability

Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances….

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports
23
Jan
2026

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports

Node.js has updated its HackerOne vulnerability disclosure program to require a minimum Signal score of 1.0, aiming to reduce low-quality…

Outlook
23
Jan
2026

Outlook for iOS crashes, freezes due to coding error

Microsoft confirmed today that Outlook mobile may crash or freeze when launched on iPad devices due to a coding error….