ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers
08
Jan
2026

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers

ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…

New GoBruteforcer attack wave targets crypto, blockchain projects
08
Jan
2026

New GoBruteforcer attack wave targets crypto, blockchain projects

A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be…

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials
08
Jan
2026

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials

A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…

ChatGPT
08
Jan
2026

OpenAI says ChatGPT won’t use your health information to train its models

OpenAI has promised that it won’t use your private health information and conversations to train its AI models, as it…

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access
08
Jan
2026

TOTOLINK EX200 Extender Flaw Allows Attackers Full System Access

A critical security flaw has been discovered in the TOTOLINK EX200 Wi-Fi extender that allows attackers to gain complete control…

Researchers rush to warn defenders of max-severity defect in n8n
08
Jan
2026

Researchers rush to warn defenders of max-severity defect in n8n

Researchers warn that a critical vulnerability in n8n, an automation platform that allows organizations to integrate AI agents, workflows and…

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information
08
Jan
2026

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information

Chinese threat actors are conducting an aggressive campaign that distributes NFC-enabled Android malware capable of intercepting and remotely relaying payment…

Grok Is Generating Sexual Content Far More Graphic Than What's on X
08
Jan
2026

Grok Is Generating Sexual Content Far More Graphic Than What’s on X

This story contains descriptions of explicit sexual content and sexual violence. Elon Musk’s Grok chatbot has drawn outrage and calls…

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics
08
Jan
2026

CrazyHunter Ransomware Targets Healthcare Sector Using Sophisticated Evasion Tactics

A sophisticated new ransomware variant, CrazyHunter, has emerged as a critical threat to the healthcare sector, employing advanced anti-malware evasion…

Ni8mare flaw gives unauthenticated control of n8n instances
08
Jan
2026

Ni8mare flaw gives unauthenticated control of n8n instances

Ni8mare flaw gives unauthenticated control of n8n instances Pierluigi Paganini January 07, 2026 A critical n8n flaw (CVE-2026-21858, CVSS 10.0),…

AI Changes I Expect in 2026
08
Jan
2026

AI Changes I Expect in 2026

Here are the biggest changes I see coming to AI in 2026. And when I say “verifiable,” I don’t mean…

Ransomware IAB abuses EDR for stealthy malware execution
08
Jan
2026

Critical jsPDF flaw lets hackers steal secrets via generated PDFs

The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that allows an attacker…