DPRK Hackers Earn $600M Posing as Remote Workers
13
Jan
2026

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled…

AsyncRAT Leveraging Cloudflare's Free-Tier Services to Mask Malicious Activities and Detection
13
Jan
2026

AsyncRAT Leveraging Cloudflare’s Free-Tier Services to Mask Malicious Activities and Detection

A recent AsyncRAT campaign is using Cloudflare’s free tier services and TryCloudflare tunnels to hide remote access activity inside normal…

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts
13
Jan
2026

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts

Facebook’s massive 3 billion active users make it an attractive target for sophisticated phishing campaigns. As attackers grow more inventive,…

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
13
Jan
2026

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become…

report-ad-banner
13
Jan
2026

Endesa Data Breach Exposes Customer Contract Information

Spanish energy provider Endesa and its regulated electricity operator Energía XXI have begun notifying customers after detecting unauthorized access to…

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
13
Jan
2026

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Hikvision, a leading provider of surveillance and access control systems, faces serious security risks from two newly disclosed stack overflow…

Important Consideration To Prevent Insider Cyber Security Threats
13
Jan
2026

Important Consideration To Prevent Insider Cyber Security Threats

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend…

Teaching cybersecurity by letting students break things
13
Jan
2026

Teaching cybersecurity by letting students break things

Cybersecurity students show higher engagement when the work feels tangible. A new study from Airbus Cybersecurity and Dauphine University describes…

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis
13
Jan
2026

AsyncRAT and the Misuse of Cloudflare Free-Tier Infrastructure: Detection and Analysis

Cybersecurity researchers have uncovered a sophisticated AsyncRAT campaign exploiting Cloudflare’s free-tier services and TryCloudflare tunneling domains to evade detection while…

What insurers expect from cyber risk in 2026
13
Jan
2026

What insurers expect from cyber risk in 2026

Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers,…

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw
13
Jan
2026

CISA Alerts on Actively Exploited Gogs Path Traversal Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Gogs, a self-hosted Git service, to its…

Cybersecurity jobs available right now: January 13, 2026
13
Jan
2026

Cybersecurity jobs available right now: January 13, 2026

CISO CSIRO | Australia | Remote – View job details As a CISO, you will lead and manage CSIRO’s cyber…