GoTo Resolve Flagged for Silent Access, Abuse Linked to Ransomware Tactics
28
Jan
2026

GoTo Resolve Tool’s Background Activities Compared to Ransomware Tactics – Hackread – Cybersecurity News, Data Breaches, AI, and More

A new security alert has been issued over a computer program that is acting as a silent gateway for intruders….

From Triage to Threat Hunts: How AI Accelerates SecOps
28
Jan
2026

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total…

UK’s ‘deregulatory’ AI approach won’t protect human rights
28
Jan
2026

FCA launches review as ‘non-human intelligence’ surpassing human reasoning is plausible

The UK’s financial services sector regulator has announced a review of the potential long-term impacts of advanced artificial intelligence (AI)…

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation
28
Jan
2026

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation

A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure. Over a…

SoundCloud Data Breach Exposes 29.8 Million Personal users Details
28
Jan
2026

SoundCloud Data Breach Exposes 29.8 Million Personal users Details

In December 2025, music streaming platform SoundCloud disclosed a significant data breach affecting approximately 29.8 million user accounts. The unauthorized…

28
Jan
2026

MIND DLP for Agentic AI protects sensitive data and controls AI access

MIND announced DLP for Agentic AI, a data-centric approach to AI security designed to help organizations safely achieve the business…

WhatsApp logo
28
Jan
2026

WhatsApp rolls out new protections against advanced exploits and spyware

WhatsApp is quietly rolling out a new safety layer for photos, videos, and documents, and it lives entirely under the…

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
28
Jan
2026

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation…

Phil Muncaster
28
Jan
2026

Drowning in spam or scam emails lately? Here’s why

Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and…

Hacker
28
Jan
2026

Slovakian man pleads guilty to operating darknet marketplace

A Slovakian national admitted on Tuesday to helping operate a darknet marketplace that sold narcotics, cybercrime tools and services, fake…

Fortinet Disables FortiCloud SSO Following 0-day Vulnerability Exploited in the Wild
28
Jan
2026

Fortinet Disables FortiCloud SSO Following 0-day Vulnerability Exploited in the Wild

Fortinet temporarily disabled its FortiCloud Single Sign-On (SSO) service after confirming active exploitation of a zero-day authentication bypass vulnerability in…

Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers
28
Jan
2026

Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher…