CISA Warns of Gogs Path Traversal Vulnerability Exploited in Attacks
13
Jan
2026

CISA Warns of Gogs Path Traversal Vulnerability Exploited in Attacks

A critical warning about a path traversal vulnerability in Gogs, a self-hosted Git service, that is being actively exploited in…

3 Best Android Apps to Help Students to Study Well
13
Jan
2026

3 Best Android Apps to Help Students to Study Well

For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time….

Parrot OS shares its 2026 plans for security tools and platform support
13
Jan
2026

Parrot OS shares its 2026 plans for security tools and platform support

Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics,…

Unlocking the value of multi-agent systems in 2026
13
Jan
2026

Execs see AI and automation as long-term strategic investments

A number of surveys conducted towards the end of 2025 suggest that IT decision makers and board-level executives see the…

DPRK's Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems
13
Jan
2026

DPRK’s Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems

The cybersecurity landscape has undergone a fundamental shift in recent years, as the definition of insider threats continues to evolve….

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets
13
Jan
2026

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets

Hikvision has disclosed two high buffer overflow vulnerabilities affecting its security devices that could allow network-based attackers to cause device…

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
13
Jan
2026

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Jan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation…

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins
13
Jan
2026

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins

Facebook users are increasingly becoming targets of a sophisticated phishing technique that bypasses conventional security measures. With over three billion…

DPRK Hackers Earn $600M Posing as Remote Workers
13
Jan
2026

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled…

AsyncRAT Leveraging Cloudflare's Free-Tier Services to Mask Malicious Activities and Detection
13
Jan
2026

AsyncRAT Leveraging Cloudflare’s Free-Tier Services to Mask Malicious Activities and Detection

A recent AsyncRAT campaign is using Cloudflare’s free tier services and TryCloudflare tunnels to hide remote access activity inside normal…

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts
13
Jan
2026

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts

Facebook’s massive 3 billion active users make it an attractive target for sophisticated phishing campaigns. As attackers grow more inventive,…

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
13
Jan
2026

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become…