Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services
27
Jan
2026

Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services

A sophisticated phishing campaign has been identified in which threat actors are abusing legitimate Microsoft Teams functionality to distribute malicious…

CISA Urges Public to Stay Alert Against Rising Natural Disaster Scams
27
Jan
2026

CISA Urges Public to Stay Alert Against Rising Natural Disaster Scams

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory alerting the public to heightened risks of malicious…

Tenable One AI Exposure delivers unified visibility and governance across AI, cloud and SaaS
27
Jan
2026

Tenable One AI Exposure delivers unified visibility and governance across AI, cloud and SaaS

Tenable announced general availability of Tenable One AI Exposure. With this release, the Tenable One Exposure Management Platform unifies AI…

Post Office scandal inquiry to publish first findings this summer
27
Jan
2026

Peer demands independent investigation into DWP’s prosecution of subpostmasters

The government should commit to a thorough independent investigation of the prosecutions of subpostmasters by the Department of Work and…

U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog
27
Jan
2026

U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…

LevelBlue acquires Fortra’s Alert Logic managed services to scale its MDR
27
Jan
2026

LevelBlue acquires Fortra’s Alert Logic managed services to scale its MDR

LevelBlue, a Dallas-based managed security services provider, announced Tuesday that it is expanding its managed detection and response business through…

Flare
27
Jan
2026

The psychology behind modern ransomware extortion

For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident…

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools
27
Jan
2026

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools

Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search…

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload
27
Jan
2026

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload

A highly sophisticated infostealer malware disguised as a legitimate npm UI component library has been targeting developers through the ansi-universal-ui…

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
27
Jan
2026

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses

A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees…

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
27
Jan
2026

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization…

Gartner: What to look for in a customer data platform
27
Jan
2026

Alan Turing Institute fellowship programme boosted by $1m from Meta

Building on the CustomerFirst unit, which was unveiled last week, the UK government has announced that Meta is investing $1m…