report-ad-banner
08
Jan
2026

Prosura Cyberattack Disrupts Insurance Services In Australia

Australian insurance provider Prosura is investigating a cyber incident after detecting unauthorized access to parts of its internal systems, which…

Researchers detail Bluetooth headphone attack that can hijack smartphones
08
Jan
2026

Researchers detail Bluetooth headphone attack that can hijack smartphones

Vulnerabilities in a very popular Bluetooth system-on-a-chip (SoC) can be used to indirectly compromise smartphones, researchers at Germany’s Enno Rey…

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
08
Jan
2026

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…

Voice cloning defenses are easier to undo than expected
08
Jan
2026

Voice cloning defenses are easier to undo than expected

Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found…

Print Friendly, PDF & Email
08
Jan
2026

Monitoring and Responding to Security Threats in Production

In the world of modern software engineering, deploying an application to production is no longer the finish line, it’s the…

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
08
Jan
2026

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit

Hackers are exploiting VMware ESXi instances in the wild with a zero-day exploit toolkit that chains multiple vulnerabilities for VM…

Chinese Hackers Launch Ongoing Attacks on Taiwan's Critical Infrastructure
08
Jan
2026

Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure

China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques
08
Jan
2026

LockBit 5.0 Unveils Advanced Encryption and Enhanced Anti-Analysis Techniques

LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…

Patients fret as ManageMyHealth data breach drama plays out
08
Jan
2026

Patients fret as ManageMyHealth data breach drama plays out

A slowly unfolding high profile data breach affecting trans-Tasman health information portal ManageMyHealth has thousands of registered patients on edge…

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers
08
Jan
2026

ToddyCat Malware Exploits ProxyLogon to Compromise Microsoft Exchange Servers

ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…

New GoBruteforcer attack wave targets crypto, blockchain projects
08
Jan
2026

New GoBruteforcer attack wave targets crypto, blockchain projects

A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be…

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials
08
Jan
2026

Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials

A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…