Flare
27
Jan
2026

The psychology behind modern ransomware extortion

For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident…

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools
27
Jan
2026

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools

Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search…

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload
27
Jan
2026

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload

A highly sophisticated infostealer malware disguised as a legitimate npm UI component library has been targeting developers through the ansi-universal-ui…

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
27
Jan
2026

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses

A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees…

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
27
Jan
2026

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization…

Gartner: What to look for in a customer data platform
27
Jan
2026

Alan Turing Institute fellowship programme boosted by $1m from Meta

Building on the CustomerFirst unit, which was unveiled last week, the UK government has announced that Meta is investing $1m…

Email
27
Jan
2026

Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Nonprofit security organization Shadowserver has found over 6,000 SmarterMail servers exposed online and likely vulnerable to attacks exploiting a critical…

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules
27
Jan
2026

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules….

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer
27
Jan
2026

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer

Threat actors have successfully exploited a design flaw in GitHub’s fork architecture to distribute malware disguised as the legitimate GitHub…

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
27
Jan
2026

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

Ravie LakshmananJan 27, 2026Web Security / Malware Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has…

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware
27
Jan
2026

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware

A judge has ordered the Kingdom of Saudi Arabia (KSA) to pay compensation of £3m to a London-based dissident who…

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users
27
Jan
2026

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users

A dangerous phishing campaign is targeting cryptocurrency holders through video calls that use artificial intelligence to create fake versions of…