Microsoft to Add Brand Impersonation Protection Warning to Teams Calls
23
Jan
2026

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

A new security feature for Teams Calling now alerts users to suspicious external calls that try to impersonate trusted organizations….

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
23
Jan
2026

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service. The flaw,…

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved…

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
23
Jan
2026

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security…

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed
23
Jan
2026

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed

The UK government is facing scrutiny for failing to do its due diligence on the environmental impacts of hyperscale datacentres,…

Intruder invaders
23
Jan
2026

What an AI-Written Honeypot Taught Us About Trusting Machines

“Vibe coding” — using AI models to help write code — has become part of everyday development for a lot…

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

A sophisticated macOS malware called MacSync has emerged as a dangerous new threat targeting cryptocurrency users through deceptive social engineering…

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
23
Jan
2026

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability

Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances….

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports
23
Jan
2026

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports

Node.js has updated its HackerOne vulnerability disclosure program to require a minimum Signal score of 1.0, aiming to reduce low-quality…

Outlook
23
Jan
2026

Outlook for iOS crashes, freezes due to coding error

Microsoft confirmed today that Outlook mobile may crash or freeze when launched on iPad devices due to a coding error….

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds
23
Jan
2026

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

A new and alarming threat has emerged in the cybersecurity landscape where attackers combine artificial intelligence with web-based attacks to…

5 Hot Cybersecurity Certifications for Salary Growth in 2026
23
Jan
2026

5 Hot Cybersecurity Certifications for Salary Growth in 2026

Cybercrime was predicted to cost the world $10.5 trillion annually in 2025, and to reach $12.2 trillion by 2031, according to Cybersecurity…